Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ricowell Ind New INQ.bat.exe

Overview

General Information

Sample name:Ricowell Ind New INQ.bat.exe
Analysis ID:1510343
MD5:4dd85e61424127b013bd9b3106b63fff
SHA1:cb0a510edadbf4b6a495c8091f81a926adf6e1f0
SHA256:6c9fcfe5c1673bf732478c3ca43d2d4f35837e116b002eff5bb92b1a4aafdaf3
Tags:batexe
Infos:

Detection

GuLoader
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Ricowell Ind New INQ.bat.exe (PID: 5524 cmdline: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe" MD5: 4DD85E61424127B013BD9B3106B63FFF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3904560282.0000000006A71000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: Ricowell Ind New INQ.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Ricowell Ind New INQ.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055F6
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
    Source: Ricowell Ind New INQ.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: Ricowell Ind New INQ.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_0040515D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040515D
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403217
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_004063100_2_00406310
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_0040499C0_2_0040499C
    Source: Ricowell Ind New INQ.bat.exe, 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs Ricowell Ind New INQ.bat.exe
    Source: Ricowell Ind New INQ.bat.exeBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs Ricowell Ind New INQ.bat.exe
    Source: Ricowell Ind New INQ.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal56.troj.evad.winEXE@1/14@0/0
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_0040442A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040442A
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile created: C:\Users\user\Videos\legioner.iniJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nst8EF5.tmpJump to behavior
    Source: Ricowell Ind New INQ.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile read: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: Besiddetrang.lnk.0.drLNK file: ..\..\..\Program Files (x86)\rytmiskes.cry
    Source: Ricowell Ind New INQ.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.3904560282.0000000006A71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeRDTSC instruction interceptor: First address: 7166580 second address: 7166580 instructions: 0x00000000 rdtsc 0x00000002 cmp dl, al 0x00000004 test dl, al 0x00000006 cmp ebx, ecx 0x00000008 jc 00007F91A0F42C41h 0x0000000a cmp bl, cl 0x0000000c inc ebp 0x0000000d test dx, dx 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055F6
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4429
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4263
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
    Source: C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exeCode function: 0_2_00405D58 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    DLL Side-Loading
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Ricowell Ind New INQ.bat.exe11%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorRicowell Ind New INQ.bat.exefalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorRicowell Ind New INQ.bat.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1510343
    Start date and time:2024-09-12 21:05:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 46s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Ricowell Ind New INQ.bat.exe
    Detection:MAL
    Classification:mal56.troj.evad.winEXE@1/14@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 99%
    • Number of executed functions: 56
    • Number of non-executed functions: 31
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: Ricowell Ind New INQ.bat.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dllSetup_x86.exeGet hashmaliciousUnknownBrowse
      ORDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
        ORDER.exeGet hashmaliciousUnknownBrowse
          ulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
            fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
              ulACwpUCSU.exeGet hashmaliciousGuLoaderBrowse
                fJuwM4Bwi7.exeGet hashmaliciousGuLoaderBrowse
                  Factura 02297-23042024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    anebilledes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      Factura 02297-23042024.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                        Category:dropped
                        Size (bytes):756
                        Entropy (8bit):3.5568394946752115
                        Encrypted:false
                        SSDEEP:12:8wl080a/ledp8tzIAGbdpYQI1aBQ1EyPWEMMgQ/CNUvH4t2YZ/elFlSJm:8wudOaAidU1zPWNMXOUFqy
                        MD5:04D3F037352154B28FA024EE90038BE2
                        SHA1:A9A62DFA3C118F889208CD01FB26C73061C21839
                        SHA-256:E31858B8877D05EE8EF5F12ED1AE001CEBADCE0143287BB28B44A1EFFDEA037A
                        SHA-512:0CCDB5F88DCD7231B809D3085F49C37E6780AC7360BCDC36E51C01C77555B8B2E143D3D766404841EB240306D73E893EB9AC5A7F88DB2DDD9310A755F8484687
                        Malicious:false
                        Reputation:low
                        Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".h.2...........rytmiskes.cry.L............................................r.y.t.m.i.s.k.e.s...c.r.y.......*.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.r.y.t.m.i.s.k.e.s...c.r.y.:.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.R.h.a.b.d.o.p.h.o.r.a.\.f.r.y.s.e.r.e.\.t.u.r.n.p.i.k.e.........*................@Z|...K.J.....................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:little endian ispell hash file (?), and 3598 string characters
                        Category:dropped
                        Size (bytes):140670
                        Entropy (8bit):4.601584331134234
                        Encrypted:false
                        SSDEEP:1536:rab6UPGJZVm9X6EJzF2pn6dLmfjHExkT/KvWISNuBPuY3qafdxBR93xX:rSPGXVg6Q524xGIxk+tBPuNYBRT
                        MD5:61E86D5C4A9BA6D4BC24C373D44393F6
                        SHA1:E741F4F9863BA09996ABD4BD313954C11E73A68E
                        SHA-256:B45B506E1827D6C57496FDEA9F37D09EC3CDC865B6E89E74577C738C04D19169
                        SHA-512:84431E29D2480E1CDC664D8FE5A7F32525A9CB2439F05BD3D765DD4AFE96E70739EC6479F7999489AF170B8405C788D314C586C294221D193B009A5FC17EB172
                        Malicious:false
                        Reputation:low
                        Preview:.......iii.dd.i.....iii.......VV...........O..;;.........................]].....u.bb.ii..w.A..........t..............LLL....................jj.....ppp.....cc.^.................i..........................................88....www.......[........f.......................................................................................+++...................C..b.......PP.---..R............;;;;....6.......$.................,.....o...W..{.W.\...............tt.............K.aa........^...........sss..[[[[[..x....................x.4........3.,,.......ZZ.............jj....................E............!!..//////............`....[[....................ddd....___....y..................~....!!.............................M..,,..........t.................bbb.....U....................."""............OOOOO............RR.>>>..9.......;.....X.......E.._.......................FF.hh.......##..Z..vv.......''............rr.....K.........??...{.......|.PP......................%......JJJJJJJ..)).aaaaa...........
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):70089
                        Entropy (8bit):1.2513184695627344
                        Encrypted:false
                        SSDEEP:384:lvTTNGT9BZiwMEYhyzAd97w8/LgInf+mLOcPI5fVOv5NxF1FOn4Y0ZNvh5OHgG:lTNWFTMEYYE72InTCuKQ7FOnQv/OAG
                        MD5:D8E80CDEDAE3E054BA1D69902A2CA6D4
                        SHA1:B53C03824D1EDE6681868FF46E00E42D5E7A046F
                        SHA-256:F5C68DAB62BFF1B4F551D1128A5A7ABD4C4B337C1CDA41F3397C22E8E10F019C
                        SHA-512:D1830FA22A6E13BF580D118B14F602520909886DE720B38BA592F427D0553735E981CFA05A2366DAEF86735B6F83C2BD217AF44B12E5826B74C78E25E9F62295
                        Malicious:false
                        Reputation:low
                        Preview:......p.................n...X....................d..........................*............................................................................M............[...........~...............................d....39...................................................................................................................................................................................................................................}.............X........................................................................................q...............................................^.................O....................................................................................Z...........................'................................................................4.........................................................o...[............................................m...............0......................X....0.........................................................
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):433347
                        Entropy (8bit):7.045313421294136
                        Encrypted:false
                        SSDEEP:12288:QUPu0XwaiQjRS4VmoXukj9VXSRLKU8qV4:LPtCQ9VmgucrSRO7qV4
                        MD5:AB410022AA79704761696EDECD82F64C
                        SHA1:93E3C5004A4DEC20EEC79A9C8175052C305866EE
                        SHA-256:DAA5834F7AE3A698960BF0CCCE998A3B829982921D05140D53F1A6100E3F28E0
                        SHA-512:7A86A1B7D8D2541577ACBF11EE1F8FFD8F62288EE407B5DE32D46308C8394F9C9A96A5C37FFAA7882995F4DB1E2CBE9823785AF63AC3CBE36FB6968B28628678
                        Malicious:false
                        Reputation:low
                        Preview:......LLLLL..................................................................................rr................p.=.......PP.f.......................c......................c..........!!....?....................t........................77..XX......................OO......g...A....FFFF..FF........||...........""..............--...............J...............#.]..h......^......<<<<.....h....8..................NN...........@@..........._...............................p.....................................................m........```..........z............................6....................I........................... ........##......CCC.....d....................__....JJJ....................z...WW................ZZ.R.......}}........??.....TT.=........b......d..).......................jj......---.>.'.....EEEEE............``......6.....)...................................|........R.....**...f...)))...................7....!...............d...........VVV..........b...o....^...............UUU.
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:FoxPro FPT, blocks size 88, next free block index 170, field type 0
                        Category:dropped
                        Size (bytes):316850
                        Entropy (8bit):1.2494344843876144
                        Encrypted:false
                        SSDEEP:768:UI1y6B1e+17bZEPl0Rnof0brVBSd/oyoTbFlbQ/BZ97yVOTLjv13Y5vx70El7oAN:ra0Xi31pavVKOa4fVlj
                        MD5:5D01D49C1498EC6723D7F194D210DDEB
                        SHA1:283514D6E17F8552A70B4B0DFB419D77FA0AE033
                        SHA-256:6D1337BE2B7C1C17CA7BE7B75518902C618F904923FE3FFBDF4F519DB6BB2BB8
                        SHA-512:286727E8962A8339E4527BFAE8B5879FF2A319C6DA090EB8130FBBB94C0C51AA0931CBCDCFC8D0B63D1DC3F30271AC193FE78C809D3F6A8B0648EB2228FEAF4D
                        Malicious:false
                        Reputation:low
                        Preview:.......X.........................J....q..................o....................................................n..............................{....5.p..V.........GV.........c........$..................................R...e.....E....................3..u...................%.....................+.......T.............z......................................`..............v....................................0................Y............................................................................................................................................................................W.........................D..................c.......................$...............N................f............... ...........R........ ....................y..............g......................P...............................................................................V.......t..............J.se...L.........................................\.........,.w.......................................D..
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):291479
                        Entropy (8bit):1.2623895916251218
                        Encrypted:false
                        SSDEEP:768:I4aF3mt3WBkVYqYZkjVzW72s6Y1rHtslWyNS652rpnfdK4xlkidjdUgxuZHUKiji:+8WZqVPshpX7P/77Lm7X7
                        MD5:2DAE10B8A993D301D5B30447CD554D49
                        SHA1:C0E795B9EBEA6ABAE51A0A56B377BDCE7A52CCF2
                        SHA-256:991EFFB618E7714390252B543789A0B6FE9E2650BD0F5049164DA51717031F51
                        SHA-512:738EE8FC2733644DD773F975075895D5D32AE2F5220A885F07F50873EA2D8FBD2E4DD9400647DF0A11E26B1489CE7391D692874D5E998E1979005D80A2790683
                        Malicious:false
                        Reputation:low
                        Preview:..................Y......................H...............Z..B............................!...................b..D........................................n...........{..........................9...............................................u.......................................*...................................................I.........T...............U.............&.............*.R.....................................................................................y..................F.....Z.....&................................................B.......L.............%...U.......;..........................I..................................._.......D....t........g.....................#.................n..a......................................M......i.....................Z..............................................{..................................................................................#....h.....U.............?.G..............L...........................................
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):527
                        Entropy (8bit):4.275388286900901
                        Encrypted:false
                        SSDEEP:12:sfiS0lw/iN/QGXqpBqt1J5WgR+FofZRVoENhEWJv:sfi3G/iRuLqzGe+FGoENhEqv
                        MD5:E22011A429D7D0729AA1A0B9CADAC17A
                        SHA1:793AE0FACF787AD29AA11A91EBFA079616EC1F10
                        SHA-256:5B857AAE7EEA7961E5571C1E7FA394E6B98C833E74E106C960BBD4D0564AC87B
                        SHA-512:32E762E9309D70F33F6B0537D55629C437D380EF2C5849A1187F4219D53075E0D6C3DF93DF500EA3F3CB5E07E0CBA85165002671362AF5500DD569C3CEB417CE
                        Malicious:false
                        Reputation:low
                        Preview:vilkaarligheden primaternes somewhere reformistiskes pseudoscientifically aggraverende ascidian tidsindstillet udvekslingsformaters porker igjen daddels..recoagulate submucronated cupular miasm mikrofon butterdejssnitter boreholes scrunger lafite childbirth samfundsvidenskaber..coabode archaeolater prisoning,taurean terminalknudes raisons trindadiske kardinaliteter fakkeltogene necessitarianism.altsaxofoner coliseum overdosage forbindelsesofficer reuphold ndlidendes amant,gldesfesternes spejlblankt toastable urol puffwig,
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):52
                        Entropy (8bit):4.0914493934217315
                        Encrypted:false
                        SSDEEP:3:sBa99k1NoCFOn:KankVg
                        MD5:5D04A35D3950677049C7A0CF17E37125
                        SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                        SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                        SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                        Malicious:false
                        Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1271146
                        Entropy (8bit):4.303850602005356
                        Encrypted:false
                        SSDEEP:12288:fUPu0XwaiQjRS4VmoXukj9VXSRLKU8qVOj+Bhu0:8PtCQ9VmgucrSRO7qVLt
                        MD5:C039BB93CFE6FBCE8775D71B4A97121F
                        SHA1:B6C450E314C239A093B32CE76965F3218052CA93
                        SHA-256:D810072EAB5D14118C42BB910B9D41E8BA4A4375A8147251F48F805B41099E35
                        SHA-512:602081EC013E79F9C019FE03316D320345A21291B9DC768EEDDFA5A5D29B6FDDD9C1D30CE7E48EA19DA46E38CE5BEDE725858BB1DCF6AADCA48BDA753DA813A9
                        Malicious:false
                        Preview:........,...................x...............................................................................................................................................................................................................................................................J...b...........#...j...............................................................................................................................k.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):74
                        Entropy (8bit):3.9637832956585757
                        Encrypted:false
                        SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                        MD5:16D513397F3C1F8334E8F3E4FC49828F
                        SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                        SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                        SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                        Malicious:false
                        Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11264
                        Entropy (8bit):5.779474184733856
                        Encrypted:false
                        SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                        MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                        SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                        SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                        SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: Setup_x86.exe, Detection: malicious, Browse
                        • Filename: ORDER.exe, Detection: malicious, Browse
                        • Filename: ORDER.exe, Detection: malicious, Browse
                        • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                        • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                        • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                        • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                        • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                        • Filename: anebilledes.exe, Detection: malicious, Browse
                        • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.51038309657817
                        Encrypted:false
                        SSDEEP:3:sEMBQEJkJVEjXcxc/MFWxQoXUn:za/MFWxvUn
                        MD5:D562E602E53D53099D119AE5C05621A6
                        SHA1:97BFC9284FA3CAE81B114BFBC596D3524B5DEAEC
                        SHA-256:547B6581CFC7080DCFDE7D659975DBD3C8453340FEAD6D9D730C3EF1A321BE7E
                        SHA-512:BF6561985EA724A425CAA7C57F87ED280A02D465BE3F5C722B2EBD089692A7F60C6C4F95F1FC414DB1C77351A78E2DD6639681C9BDB58CA64930FDFF491AED18
                        Malicious:false
                        Preview:kernel32::VirtualAlloc(i 0,i 98922496, i 0x3000, i 0x40)p.r1
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):56
                        Entropy (8bit):4.286618146008852
                        Encrypted:false
                        SSDEEP:3:sAAEVvjsxc18L84n:fLV1y
                        MD5:CC1EFDC8BFFFF229914A7F388FA2E097
                        SHA1:DB9C5B435EA436A44B459143BD6F2305E87EED22
                        SHA-256:DC5091A590EA356B8D08D9A053D42B51B91ECC876F29F2CDC589F77F1097C231
                        SHA-512:B63125D3C32176FA593FF17913C63CBED1FB7900AE60C4998DDD7F736D4F6AE40FF828AF145579F11C974546E6EA78429694E268EEFF964EC442CE9320F98269
                        Malicious:false
                        Preview:kernel32::ReadFile(i r5, i r1, i 98922496,*i 0, i 0)i.r3
                        Process:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):4.256564762130954
                        Encrypted:false
                        SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                        MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                        SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                        SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                        SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                        Malicious:false
                        Preview:user32::EnumWindows(i r1 ,i 0)
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.669590475089014
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 92.16%
                        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Ricowell Ind New INQ.bat.exe
                        File size:626'090 bytes
                        MD5:4dd85e61424127b013bd9b3106b63fff
                        SHA1:cb0a510edadbf4b6a495c8091f81a926adf6e1f0
                        SHA256:6c9fcfe5c1673bf732478c3ca43d2d4f35837e116b002eff5bb92b1a4aafdaf3
                        SHA512:1e2f1d231a77efeff7fe4504180e18da26ce630f049155d7cb8975abbcd0982c6a52f0f8190ee3a97c68b4ce801c1f0579192ee676c10df4663c08a1a6952922
                        SSDEEP:6144:qcQ9zFQ+29Sn4Zr7n8lJ/vMLJnJmH1YMqJqcn9me0TtJMiWIBLuExc3QRaF0ZENN:uQ7c4WlPWprP0TGsyXcJFAYwvYF23
                        TLSH:E2D40254FBA0CD07CE08167899A2F77CA234AF989D1786276FFC3EAB3D25B195C84141
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................^...........2.......p....@
                        Icon Hash:033b3b2b2f231903
                        Entrypoint:0x403217
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x55C15CE3 [Wed Aug 5 00:46:27 2015 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:59a4a44a250c4cf4f2d9de2b3fe5d95f
                        Instruction
                        sub esp, 00000184h
                        push ebx
                        push ebp
                        push esi
                        xor ebx, ebx
                        push edi
                        mov dword ptr [esp+18h], ebx
                        mov dword ptr [esp+10h], 00409130h
                        mov dword ptr [esp+20h], ebx
                        mov byte ptr [esp+14h], 00000020h
                        call dword ptr [00407034h]
                        push 00008001h
                        call dword ptr [004070B4h]
                        push ebx
                        call dword ptr [0040728Ch]
                        push 00000009h
                        mov dword ptr [004237B8h], eax
                        call 00007F91A122FB2Ah
                        mov dword ptr [00423704h], eax
                        push ebx
                        lea eax, dword ptr [esp+38h]
                        push 00000160h
                        push eax
                        push ebx
                        push 0041ECB8h
                        call dword ptr [00407164h]
                        push 004091E4h
                        push 00422F00h
                        call 00007F91A122F7D4h
                        call dword ptr [004070B0h]
                        mov ebp, 00429000h
                        push eax
                        push ebp
                        call 00007F91A122F7C2h
                        push ebx
                        call dword ptr [00407118h]
                        cmp byte ptr [00429000h], 00000022h
                        mov dword ptr [00423700h], eax
                        mov eax, ebp
                        jne 00007F91A122CD2Ch
                        mov byte ptr [esp+14h], 00000022h
                        mov eax, 00429001h
                        push dword ptr [esp+14h]
                        push eax
                        call 00007F91A122F252h
                        push eax
                        call dword ptr [00407220h]
                        mov dword ptr [esp+1Ch], eax
                        jmp 00007F91A122CDE5h
                        cmp cl, 00000020h
                        jne 00007F91A122CD28h
                        inc eax
                        cmp byte ptr [eax], 00000020h
                        je 00007F91A122CD1Ch
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x19a38.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5c3a0x5e00e5e7adda692e6e028f515fe3daa2b69fFalse0.658951130319149data6.410406825129756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x70000x11ce0x12005801d712ecba58aa87d1e7d1aa24f3aaFalse0.4522569444444444OpenPGP Secret Key5.236122428806677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x90000x1a7f80x400cc58d0a55ac015d8f1470ea90f440596False0.615234375data5.02661163746607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x240000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x370000x19a380x19c00e044a410021a8fe3ff8a6b58a67f455fFalse0.32481606492718446data4.427147608048424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x372c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.28862534011593516
                        RT_ICON0x47af00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.37706660368445916
                        RT_ICON0x4bd180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4048755186721992
                        RT_ICON0x4e2c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4725609756097561
                        RT_ICON0x4f3680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.5151639344262295
                        RT_ICON0x4fcf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.5363475177304965
                        RT_DIALOG0x501580x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x502580x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x503780x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x503d80x5adataEnglishUnited States0.7888888888888889
                        RT_VERSION0x504380x2c0dataEnglishUnited States0.4772727272727273
                        RT_MANIFEST0x506f80x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                        DLLImport
                        KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                        USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                        ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:15:06:05
                        Start date:12/09/2024
                        Path:C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"
                        Imagebase:0x400000
                        File size:626'090 bytes
                        MD5 hash:4DD85E61424127B013BD9B3106B63FFF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3904560282.0000000006A71000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:21.6%
                          Dynamic/Decrypted Code Coverage:14.4%
                          Signature Coverage:19.5%
                          Total number of Nodes:1468
                          Total number of Limit Nodes:41
                          execution_graph 4890 10001000 4893 1000101b 4890->4893 4900 100014bb 4893->4900 4895 10001020 4896 10001024 4895->4896 4897 10001027 GlobalAlloc 4895->4897 4898 100014e2 3 API calls 4896->4898 4897->4896 4899 10001019 4898->4899 4902 100014c1 4900->4902 4901 100014c7 4901->4895 4902->4901 4903 100014d3 GlobalFree 4902->4903 4903->4895 4904 4022c0 4905 4022f0 4904->4905 4906 4022c5 4904->4906 4908 4029fd 18 API calls 4905->4908 4907 402b07 19 API calls 4906->4907 4909 4022cc 4907->4909 4910 4022f7 4908->4910 4911 4029fd 18 API calls 4909->4911 4914 40230d 4909->4914 4915 402a3d RegOpenKeyExA 4910->4915 4913 4022dd RegDeleteValueA RegCloseKey 4911->4913 4913->4914 4922 402a68 4915->4922 4924 402ab4 4915->4924 4916 402a8e RegEnumKeyA 4917 402aa0 RegCloseKey 4916->4917 4916->4922 4919 406061 3 API calls 4917->4919 4918 402ac5 RegCloseKey 4918->4924 4921 402ab0 4919->4921 4920 402a3d 3 API calls 4920->4922 4923 402ae0 RegDeleteKeyA 4921->4923 4921->4924 4922->4916 4922->4917 4922->4918 4922->4920 4923->4924 4924->4914 4925 4019c0 4926 4029fd 18 API calls 4925->4926 4927 4019c7 4926->4927 4928 4029fd 18 API calls 4927->4928 4929 4019d0 4928->4929 4930 4019d7 lstrcmpiA 4929->4930 4931 4019e9 lstrcmpA 4929->4931 4932 4019dd 4930->4932 4931->4932 4933 402b42 4934 402b51 SetTimer 4933->4934 4935 402b6a 4933->4935 4934->4935 4936 402bb8 4935->4936 4937 402bbe MulDiv 4935->4937 4938 402b78 wsprintfA SetWindowTextA SetDlgItemTextA 4937->4938 4938->4936 4940 402645 4941 4029fd 18 API calls 4940->4941 4942 40264c FindFirstFileA 4941->4942 4943 40266f 4942->4943 4944 40265f 4942->4944 4948 405c94 wsprintfA 4943->4948 4946 402676 4949 405d36 lstrcpynA 4946->4949 4948->4946 4949->4944 4950 403745 4951 403750 4950->4951 4952 403754 4951->4952 4953 403757 GlobalAlloc 4951->4953 4953->4952 4968 4023c8 4969 402b07 19 API calls 4968->4969 4970 4023d2 4969->4970 4971 4029fd 18 API calls 4970->4971 4972 4023db 4971->4972 4973 4023e5 RegQueryValueExA 4972->4973 4976 402663 4972->4976 4974 40240b RegCloseKey 4973->4974 4975 402405 4973->4975 4974->4976 4975->4974 4979 405c94 wsprintfA 4975->4979 4979->4974 4103 4014ca 4104 40501f 25 API calls 4103->4104 4105 4014d1 4104->4105 4980 401ccc GetDlgItem GetClientRect 4981 4029fd 18 API calls 4980->4981 4982 401cfc LoadImageA SendMessageA 4981->4982 4983 402892 4982->4983 4984 401d1a DeleteObject 4982->4984 4984->4983 4985 1000180d 4986 10001830 4985->4986 4987 10001860 GlobalFree 4986->4987 4988 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4986->4988 4987->4988 4989 10001266 2 API calls 4988->4989 4990 100019e3 GlobalFree GlobalFree 4989->4990 4127 1000270f 4128 1000275f 4127->4128 4129 1000271f VirtualProtect 4127->4129 4129->4128 4130 4024d1 4131 4024d6 4130->4131 4132 4024e7 4130->4132 4133 4029e0 18 API calls 4131->4133 4134 4029fd 18 API calls 4132->4134 4136 4024dd 4133->4136 4135 4024ee lstrlenA 4134->4135 4135->4136 4137 40250d WriteFile 4136->4137 4138 402663 4136->4138 4137->4138 4168 4025d3 4169 4025da 4168->4169 4171 40283f 4168->4171 4170 4029e0 18 API calls 4169->4170 4172 4025e5 4170->4172 4173 4025ec SetFilePointer 4172->4173 4173->4171 4174 4025fc 4173->4174 4176 405c94 wsprintfA 4174->4176 4176->4171 4206 4014d6 4207 4029e0 18 API calls 4206->4207 4208 4014dc Sleep 4207->4208 4210 402892 4208->4210 4629 401dd8 4630 4029fd 18 API calls 4629->4630 4631 401dde 4630->4631 4632 4029fd 18 API calls 4631->4632 4633 401de7 4632->4633 4634 4029fd 18 API calls 4633->4634 4635 401df0 4634->4635 4636 4029fd 18 API calls 4635->4636 4637 401df9 4636->4637 4638 401423 25 API calls 4637->4638 4639 401e00 ShellExecuteA 4638->4639 4640 401e2d 4639->4640 4998 1000161a 4999 10001649 4998->4999 5000 10001a5d 18 API calls 4999->5000 5001 10001650 5000->5001 5002 10001663 5001->5002 5003 10001657 5001->5003 5005 1000168a 5002->5005 5006 1000166d 5002->5006 5004 10001266 2 API calls 5003->5004 5007 10001661 5004->5007 5009 10001690 5005->5009 5010 100016b4 5005->5010 5008 100014e2 3 API calls 5006->5008 5012 10001672 5008->5012 5013 10001559 3 API calls 5009->5013 5011 100014e2 3 API calls 5010->5011 5011->5007 5014 10001559 3 API calls 5012->5014 5015 10001695 5013->5015 5017 10001678 5014->5017 5016 10001266 2 API calls 5015->5016 5018 1000169b GlobalFree 5016->5018 5019 10001266 2 API calls 5017->5019 5018->5007 5020 100016af GlobalFree 5018->5020 5021 1000167e GlobalFree 5019->5021 5020->5007 5021->5007 5022 40155b 5023 401577 ShowWindow 5022->5023 5024 40157e 5022->5024 5023->5024 5025 402892 5024->5025 5026 40158c ShowWindow 5024->5026 5026->5025 5034 401edc 5035 4029fd 18 API calls 5034->5035 5036 401ee3 GetFileVersionInfoSizeA 5035->5036 5037 401f06 GlobalAlloc 5036->5037 5039 401f5c 5036->5039 5038 401f1a GetFileVersionInfoA 5037->5038 5037->5039 5038->5039 5040 401f2b VerQueryValueA 5038->5040 5040->5039 5041 401f44 5040->5041 5045 405c94 wsprintfA 5041->5045 5043 401f50 5046 405c94 wsprintfA 5043->5046 5045->5043 5046->5039 4792 40515d 4793 405308 4792->4793 4794 40517f GetDlgItem GetDlgItem GetDlgItem 4792->4794 4796 405310 GetDlgItem CreateThread CloseHandle 4793->4796 4797 405338 4793->4797 4838 404021 SendMessageA 4794->4838 4796->4797 4841 4050f1 5 API calls 4796->4841 4799 405366 4797->4799 4802 405387 4797->4802 4803 40534e ShowWindow ShowWindow 4797->4803 4798 4051ef 4807 4051f6 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4798->4807 4800 4053c1 4799->4800 4801 40536e 4799->4801 4800->4802 4814 4053ce SendMessageA 4800->4814 4804 405376 4801->4804 4805 40539a ShowWindow 4801->4805 4806 404053 8 API calls 4802->4806 4840 404021 SendMessageA 4803->4840 4809 403fc5 SendMessageA 4804->4809 4810 4053ba 4805->4810 4811 4053ac 4805->4811 4820 405393 4806->4820 4812 405264 4807->4812 4813 405248 SendMessageA SendMessageA 4807->4813 4809->4802 4816 403fc5 SendMessageA 4810->4816 4815 40501f 25 API calls 4811->4815 4817 405277 4812->4817 4818 405269 SendMessageA 4812->4818 4813->4812 4819 4053e7 CreatePopupMenu 4814->4819 4814->4820 4815->4810 4816->4800 4821 403fec 19 API calls 4817->4821 4818->4817 4822 405d58 18 API calls 4819->4822 4824 405287 4821->4824 4823 4053f7 AppendMenuA 4822->4823 4825 405415 GetWindowRect 4823->4825 4826 405428 TrackPopupMenu 4823->4826 4827 405290 ShowWindow 4824->4827 4828 4052c4 GetDlgItem SendMessageA 4824->4828 4825->4826 4826->4820 4829 405444 4826->4829 4830 4052b3 4827->4830 4831 4052a6 ShowWindow 4827->4831 4828->4820 4832 4052eb SendMessageA SendMessageA 4828->4832 4833 405463 SendMessageA 4829->4833 4839 404021 SendMessageA 4830->4839 4831->4830 4832->4820 4833->4833 4834 405480 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4833->4834 4836 4054a2 SendMessageA 4834->4836 4836->4836 4837 4054c4 GlobalUnlock SetClipboardData CloseClipboard 4836->4837 4837->4820 4838->4798 4839->4828 4840->4799 5052 4018e3 5053 40191a 5052->5053 5054 4029fd 18 API calls 5053->5054 5055 40191f 5054->5055 5056 4055f6 71 API calls 5055->5056 5057 401928 5056->5057 5058 4043e3 5059 4043f3 5058->5059 5060 404419 5058->5060 5061 403fec 19 API calls 5059->5061 5062 404053 8 API calls 5060->5062 5063 404400 SetDlgItemTextA 5061->5063 5064 404425 5062->5064 5063->5060 5065 4018e6 5066 4029fd 18 API calls 5065->5066 5067 4018ed 5066->5067 5068 40554a MessageBoxIndirectA 5067->5068 5069 4018f6 5068->5069 3866 401f68 3867 401f7a 3866->3867 3868 402028 3866->3868 3887 4029fd 3867->3887 3871 401423 25 API calls 3868->3871 3876 402181 3871->3876 3872 4029fd 18 API calls 3873 401f8a 3872->3873 3874 401f92 GetModuleHandleA 3873->3874 3875 401f9f LoadLibraryExA 3873->3875 3874->3875 3877 401faf GetProcAddress 3874->3877 3875->3868 3875->3877 3878 401ffb 3877->3878 3879 401fbe 3877->3879 3938 40501f 3878->3938 3881 401fc6 3879->3881 3882 401fdd 3879->3882 3935 401423 3881->3935 3893 100016bd 3882->3893 3884 401fce 3884->3876 3885 40201c FreeLibrary 3884->3885 3885->3876 3888 402a09 3887->3888 3949 405d58 3888->3949 3891 401f81 3891->3872 3894 100016ed 3893->3894 3988 10001a5d 3894->3988 3896 100016f4 3897 1000180a 3896->3897 3898 10001705 3896->3898 3899 1000170c 3896->3899 3897->3884 4037 100021b0 3898->4037 4020 100021fa 3899->4020 3904 10001770 3910 100017b2 3904->3910 3911 10001776 3904->3911 3905 10001752 4050 100023da 3905->4050 3906 10001722 3909 10001728 3906->3909 3915 10001733 3906->3915 3907 1000173b 3922 10001731 3907->3922 4047 10002aa7 3907->4047 3909->3922 4031 100027ec 3909->4031 3913 100023da 11 API calls 3910->3913 3917 10001559 3 API calls 3911->3917 3923 100017a4 3913->3923 3914 10001758 4061 10001559 3914->4061 4041 1000258d 3915->4041 3920 1000178c 3917->3920 3921 100023da 11 API calls 3920->3921 3921->3923 3922->3904 3922->3905 3926 100017f9 3923->3926 4072 100023a0 3923->4072 3925 10001739 3925->3922 3926->3897 3928 10001803 GlobalFree 3926->3928 3928->3897 3932 100017e5 3932->3926 4076 100014e2 wsprintfA 3932->4076 3933 100017de FreeLibrary 3933->3932 3936 40501f 25 API calls 3935->3936 3937 401431 3936->3937 3937->3884 3939 4050dd 3938->3939 3940 40503a 3938->3940 3939->3884 3941 405057 lstrlenA 3940->3941 3942 405d58 18 API calls 3940->3942 3943 405080 3941->3943 3944 405065 lstrlenA 3941->3944 3942->3941 3946 405093 3943->3946 3947 405086 SetWindowTextA 3943->3947 3944->3939 3945 405077 lstrcatA 3944->3945 3945->3943 3946->3939 3948 405099 SendMessageA SendMessageA SendMessageA 3946->3948 3947->3946 3948->3939 3965 405d65 3949->3965 3950 405f88 3951 402a2a 3950->3951 3983 405d36 lstrcpynA 3950->3983 3951->3891 3967 405fa1 3951->3967 3953 405e06 GetVersion 3953->3965 3954 405f5f lstrlenA 3954->3965 3957 405d58 10 API calls 3957->3954 3959 405e7e GetSystemDirectoryA 3959->3965 3960 405e91 GetWindowsDirectoryA 3960->3965 3961 405fa1 5 API calls 3961->3965 3962 405d58 10 API calls 3962->3965 3963 405f08 lstrcatA 3963->3965 3964 405ec5 SHGetSpecialFolderLocation 3964->3965 3966 405edd SHGetPathFromIDListA CoTaskMemFree 3964->3966 3965->3950 3965->3953 3965->3954 3965->3957 3965->3959 3965->3960 3965->3961 3965->3962 3965->3963 3965->3964 3976 405c1d RegOpenKeyExA 3965->3976 3981 405c94 wsprintfA 3965->3981 3982 405d36 lstrcpynA 3965->3982 3966->3965 3968 405fad 3967->3968 3970 40600a CharNextA 3968->3970 3972 406015 3968->3972 3974 405ff8 CharNextA 3968->3974 3975 406005 CharNextA 3968->3975 3984 4057f1 3968->3984 3969 406019 CharPrevA 3969->3972 3970->3968 3970->3972 3972->3969 3973 406034 3972->3973 3973->3891 3974->3968 3975->3970 3977 405c50 RegQueryValueExA 3976->3977 3978 405c8e 3976->3978 3979 405c71 RegCloseKey 3977->3979 3978->3965 3979->3978 3981->3965 3982->3965 3983->3951 3985 4057f7 3984->3985 3986 40580a 3985->3986 3987 4057fd CharNextA 3985->3987 3986->3968 3987->3985 4079 10001215 GlobalAlloc 3988->4079 3990 10001a81 4080 10001215 GlobalAlloc 3990->4080 3992 10001cbb GlobalFree GlobalFree GlobalFree 3993 10001cd8 3992->3993 4008 10001d22 3992->4008 3994 1000201a 3993->3994 4002 10001ced 3993->4002 3993->4008 3996 1000203c GetModuleHandleA 3994->3996 3994->4008 3995 10001b60 GlobalAlloc 4015 10001a8c 3995->4015 3997 10002062 3996->3997 3998 1000204d LoadLibraryA 3996->3998 4087 100015a4 GetProcAddress 3997->4087 3998->3997 3998->4008 3999 10001bab lstrcpyA 4003 10001bb5 lstrcpyA 3999->4003 4000 10001bc9 GlobalFree 4000->4015 4002->4008 4083 10001224 4002->4083 4003->4015 4004 100020b3 4007 100020c0 lstrlenA 4004->4007 4004->4008 4006 10001f7a 4006->4008 4012 10001fbe lstrcpyA 4006->4012 4088 100015a4 GetProcAddress 4007->4088 4008->3896 4009 10002074 4009->4004 4019 1000209d GetProcAddress 4009->4019 4012->4008 4013 10001c07 4013->4015 4081 10001534 GlobalSize GlobalAlloc 4013->4081 4014 10001e75 GlobalFree 4014->4015 4015->3992 4015->3995 4015->3999 4015->4000 4015->4003 4015->4006 4015->4008 4015->4013 4015->4014 4018 10001224 2 API calls 4015->4018 4086 10001215 GlobalAlloc 4015->4086 4016 100020d9 4016->4008 4018->4015 4019->4004 4021 10002212 4020->4021 4023 10002349 GlobalFree 4021->4023 4025 100022b9 GlobalAlloc MultiByteToWideChar 4021->4025 4026 1000230a lstrlenA 4021->4026 4027 10001224 GlobalAlloc lstrcpynA 4021->4027 4090 100012ad 4021->4090 4023->4021 4024 10001712 4023->4024 4024->3906 4024->3907 4024->3922 4028 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4025->4028 4030 10002303 4025->4030 4026->4023 4026->4030 4027->4021 4028->4023 4030->4023 4094 10002521 4030->4094 4033 100027fe 4031->4033 4032 100028a3 CreateFileA 4034 100028c1 4032->4034 4033->4032 4035 100029b2 GetLastError 4034->4035 4036 100029bd 4034->4036 4035->4036 4036->3922 4038 100021c0 4037->4038 4040 1000170b 4037->4040 4039 100021d2 GlobalAlloc 4038->4039 4038->4040 4039->4038 4040->3899 4045 100025a9 4041->4045 4042 100025fa GlobalAlloc 4046 1000261c 4042->4046 4043 1000260d 4044 10002612 GlobalSize 4043->4044 4043->4046 4044->4046 4045->4042 4045->4043 4046->3925 4048 10002ab2 4047->4048 4049 10002af2 GlobalFree 4048->4049 4097 10001215 GlobalAlloc 4050->4097 4052 10002473 WideCharToMultiByte 4055 100023e6 4052->4055 4053 1000243a lstrcpynA 4053->4055 4054 1000244b StringFromGUID2 WideCharToMultiByte 4054->4055 4055->4052 4055->4053 4055->4054 4056 10002494 wsprintfA 4055->4056 4057 100024b8 GlobalFree 4055->4057 4058 100024f2 GlobalFree 4055->4058 4059 10001266 2 API calls 4055->4059 4098 100012d1 4055->4098 4056->4055 4057->4055 4058->3914 4059->4055 4102 10001215 GlobalAlloc 4061->4102 4063 1000155f 4064 1000156c lstrcpyA 4063->4064 4066 10001586 4063->4066 4067 100015a0 4064->4067 4066->4067 4068 1000158b wsprintfA 4066->4068 4069 10001266 4067->4069 4068->4067 4070 100012a8 GlobalFree 4069->4070 4071 1000126f GlobalAlloc lstrcpynA 4069->4071 4070->3923 4071->4070 4073 100017c5 4072->4073 4074 100023ae 4072->4074 4073->3932 4073->3933 4074->4073 4075 100023c7 GlobalFree 4074->4075 4075->4074 4077 10001266 2 API calls 4076->4077 4078 10001503 4077->4078 4078->3926 4079->3990 4080->4015 4082 10001552 4081->4082 4082->4013 4089 10001215 GlobalAlloc 4083->4089 4085 10001233 lstrcpynA 4085->4008 4086->4015 4087->4009 4088->4016 4089->4085 4091 100012b4 4090->4091 4092 10001224 2 API calls 4091->4092 4093 100012cf 4092->4093 4093->4021 4095 10002585 4094->4095 4096 1000252f VirtualAlloc 4094->4096 4095->4030 4096->4095 4097->4055 4099 100012f9 4098->4099 4100 100012da 4098->4100 4099->4055 4100->4099 4101 100012e0 lstrcpyA 4100->4101 4101->4099 4102->4063 5070 40286d SendMessageA 5071 402892 5070->5071 5072 402887 InvalidateRect 5070->5072 5072->5071 5073 4014f0 SetForegroundWindow 5074 402892 5073->5074 5075 401af0 5076 4029fd 18 API calls 5075->5076 5077 401af7 5076->5077 5078 4029e0 18 API calls 5077->5078 5079 401b00 wsprintfA 5078->5079 5080 402892 5079->5080 4139 4019f1 4140 4029fd 18 API calls 4139->4140 4141 4019fa ExpandEnvironmentStringsA 4140->4141 4142 401a0e 4141->4142 4144 401a21 4141->4144 4143 401a13 lstrcmpA 4142->4143 4142->4144 4143->4144 5081 100015b3 5082 100014bb GlobalFree 5081->5082 5084 100015cb 5082->5084 5083 10001611 GlobalFree 5084->5083 5085 100015e6 5084->5085 5086 100015fd VirtualFree 5084->5086 5085->5083 5086->5083 5094 401c78 5095 4029e0 18 API calls 5094->5095 5096 401c7e IsWindow 5095->5096 5097 4019e1 5096->5097 5098 40477a 5099 4047a6 5098->5099 5100 40478a 5098->5100 5102 4047d9 5099->5102 5103 4047ac SHGetPathFromIDListA 5099->5103 5109 40552e GetDlgItemTextA 5100->5109 5104 4047bc 5103->5104 5108 4047c3 SendMessageA 5103->5108 5106 40140b 2 API calls 5104->5106 5105 404797 SendMessageA 5105->5099 5106->5108 5108->5102 5109->5105 5110 1000103d 5111 1000101b 5 API calls 5110->5111 5112 10001056 5111->5112 5113 4014fe 5114 401506 5113->5114 5116 401519 5113->5116 5115 4029e0 18 API calls 5114->5115 5115->5116 4842 40227f 4843 4029fd 18 API calls 4842->4843 4844 402290 4843->4844 4845 4029fd 18 API calls 4844->4845 4846 402299 4845->4846 4847 4029fd 18 API calls 4846->4847 4848 4022a3 GetPrivateProfileStringA 4847->4848 5117 401000 5118 401037 BeginPaint GetClientRect 5117->5118 5119 40100c DefWindowProcA 5117->5119 5121 4010f3 5118->5121 5122 401179 5119->5122 5123 401073 CreateBrushIndirect FillRect DeleteObject 5121->5123 5124 4010fc 5121->5124 5123->5121 5125 401102 CreateFontIndirectA 5124->5125 5126 401167 EndPaint 5124->5126 5125->5126 5127 401112 6 API calls 5125->5127 5126->5122 5127->5126 5128 404100 lstrcpynA lstrlenA 5129 402602 5130 402892 5129->5130 5131 402609 5129->5131 5132 40260f FindClose 5131->5132 5132->5130 5140 402683 5141 4029fd 18 API calls 5140->5141 5142 402691 5141->5142 5143 4026a7 5142->5143 5145 4029fd 18 API calls 5142->5145 5144 4059a2 2 API calls 5143->5144 5146 4026ad 5144->5146 5145->5143 5166 4059c7 GetFileAttributesA CreateFileA 5146->5166 5148 4026ba 5149 402763 5148->5149 5150 4026c6 GlobalAlloc 5148->5150 5153 40276b DeleteFileA 5149->5153 5154 40277e 5149->5154 5151 40275a CloseHandle 5150->5151 5152 4026df 5150->5152 5151->5149 5167 4031cc SetFilePointer 5152->5167 5153->5154 5156 4026e5 5157 4031b6 ReadFile 5156->5157 5158 4026ee GlobalAlloc 5157->5158 5159 402732 WriteFile GlobalFree 5158->5159 5160 4026fe 5158->5160 5161 402f1f 46 API calls 5159->5161 5162 402f1f 46 API calls 5160->5162 5163 402757 5161->5163 5165 40270b 5162->5165 5163->5151 5164 402729 GlobalFree 5164->5159 5165->5164 5166->5148 5167->5156 5168 401705 5169 4029fd 18 API calls 5168->5169 5170 40170c SearchPathA 5169->5170 5171 4027bd 5170->5171 5172 401727 5170->5172 5172->5171 5174 405d36 lstrcpynA 5172->5174 5174->5171 5175 100029c7 5176 100029df 5175->5176 5177 10001534 2 API calls 5176->5177 5178 100029fa 5177->5178 5179 40280a 5180 4029e0 18 API calls 5179->5180 5181 402810 5180->5181 5182 402841 5181->5182 5183 402663 5181->5183 5185 40281e 5181->5185 5182->5183 5184 405d58 18 API calls 5182->5184 5184->5183 5185->5183 5187 405c94 wsprintfA 5185->5187 5187->5183 5188 40218a 5189 4029fd 18 API calls 5188->5189 5190 402190 5189->5190 5191 4029fd 18 API calls 5190->5191 5192 402199 5191->5192 5193 4029fd 18 API calls 5192->5193 5194 4021a2 5193->5194 5195 40603a 2 API calls 5194->5195 5196 4021ab 5195->5196 5197 4021bc lstrlenA lstrlenA 5196->5197 5201 4021af 5196->5201 5199 40501f 25 API calls 5197->5199 5198 40501f 25 API calls 5202 4021b7 5198->5202 5200 4021f8 SHFileOperationA 5199->5200 5200->5201 5200->5202 5201->5198 5201->5202 5203 40220c 5204 402213 5203->5204 5208 402226 5203->5208 5205 405d58 18 API calls 5204->5205 5206 402220 5205->5206 5207 40554a MessageBoxIndirectA 5206->5207 5207->5208 5209 401490 5210 40501f 25 API calls 5209->5210 5211 401497 5210->5211 5212 406310 5214 406194 5212->5214 5213 406aff 5214->5213 5215 406215 GlobalFree 5214->5215 5216 40621e GlobalAlloc 5214->5216 5217 406295 GlobalAlloc 5214->5217 5218 40628c GlobalFree 5214->5218 5215->5216 5216->5213 5216->5214 5217->5213 5217->5214 5218->5217 5219 401b11 5220 401b62 5219->5220 5221 401b1e 5219->5221 5222 401b66 5220->5222 5223 401b8b GlobalAlloc 5220->5223 5224 401ba6 5221->5224 5229 401b35 5221->5229 5232 402226 5222->5232 5240 405d36 lstrcpynA 5222->5240 5225 405d58 18 API calls 5223->5225 5226 405d58 18 API calls 5224->5226 5224->5232 5225->5224 5228 402220 5226->5228 5233 40554a MessageBoxIndirectA 5228->5233 5238 405d36 lstrcpynA 5229->5238 5231 401b78 GlobalFree 5231->5232 5233->5232 5234 401b44 5239 405d36 lstrcpynA 5234->5239 5236 401b53 5241 405d36 lstrcpynA 5236->5241 5238->5234 5239->5236 5240->5231 5241->5232 5242 404f93 5243 404fa3 5242->5243 5244 404fb7 5242->5244 5245 404fa9 5243->5245 5254 405000 5243->5254 5246 404fbf IsWindowVisible 5244->5246 5250 404fd6 5244->5250 5248 404038 SendMessageA 5245->5248 5249 404fcc 5246->5249 5246->5254 5247 405005 CallWindowProcA 5251 404fb3 5247->5251 5248->5251 5255 4048ea SendMessageA 5249->5255 5250->5247 5260 40496a 5250->5260 5254->5247 5256 404949 SendMessageA 5255->5256 5257 40490d GetMessagePos ScreenToClient SendMessageA 5255->5257 5258 404941 5256->5258 5257->5258 5259 404946 5257->5259 5258->5250 5259->5256 5269 405d36 lstrcpynA 5260->5269 5262 40497d 5270 405c94 wsprintfA 5262->5270 5264 404987 5265 40140b 2 API calls 5264->5265 5266 404990 5265->5266 5271 405d36 lstrcpynA 5266->5271 5268 404997 5268->5254 5269->5262 5270->5264 5271->5268 4202 401595 4203 4029fd 18 API calls 4202->4203 4204 40159c SetFileAttributesA 4203->4204 4205 4015ae 4204->4205 5272 401c95 5273 4029e0 18 API calls 5272->5273 5274 401c9c 5273->5274 5275 4029e0 18 API calls 5274->5275 5276 401ca4 GetDlgItem 5275->5276 5277 4024cb 5276->5277 4229 403217 #17 SetErrorMode OleInitialize 4304 406061 GetModuleHandleA 4229->4304 4233 403287 GetCommandLineA 4309 405d36 lstrcpynA 4233->4309 4235 403299 GetModuleHandleA 4236 4032b0 4235->4236 4237 4057f1 CharNextA 4236->4237 4238 4032c4 CharNextA 4237->4238 4244 4032d4 4238->4244 4239 40339e 4240 4033b1 GetTempPathA 4239->4240 4310 4031e3 4240->4310 4242 4033c9 4245 403423 DeleteFileA 4242->4245 4246 4033cd GetWindowsDirectoryA lstrcatA 4242->4246 4243 4057f1 CharNextA 4243->4244 4244->4239 4244->4243 4249 4033a0 4244->4249 4318 402c79 GetTickCount GetModuleFileNameA 4245->4318 4248 4031e3 11 API calls 4246->4248 4251 4033e9 4248->4251 4402 405d36 lstrcpynA 4249->4402 4250 403437 4258 4057f1 CharNextA 4250->4258 4287 4034bd 4250->4287 4298 4034cd 4250->4298 4251->4245 4253 4033ed GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4251->4253 4254 4031e3 11 API calls 4253->4254 4256 40341b 4254->4256 4256->4245 4256->4298 4260 403452 4258->4260 4267 403498 4260->4267 4268 4034fc lstrcatA lstrcmpiA 4260->4268 4261 4034e6 4428 40554a 4261->4428 4262 4035da 4263 40367d ExitProcess 4262->4263 4266 406061 3 API calls 4262->4266 4270 4035ed 4266->4270 4403 4058b4 4267->4403 4272 403518 CreateDirectoryA SetCurrentDirectoryA 4268->4272 4268->4298 4275 406061 3 API calls 4270->4275 4273 40353a 4272->4273 4274 40352f 4272->4274 4433 405d36 lstrcpynA 4273->4433 4432 405d36 lstrcpynA 4274->4432 4279 4035f6 4275->4279 4281 406061 3 API calls 4279->4281 4283 4035ff 4281->4283 4282 4034b2 4418 405d36 lstrcpynA 4282->4418 4286 40361d 4283->4286 4292 40360d GetCurrentProcess 4283->4292 4285 405d58 18 API calls 4288 403579 DeleteFileA 4285->4288 4289 406061 3 API calls 4286->4289 4348 403787 4287->4348 4290 403586 CopyFileA 4288->4290 4301 403548 4288->4301 4291 403654 4289->4291 4290->4301 4294 403669 ExitWindowsEx 4291->4294 4297 403676 4291->4297 4292->4286 4293 4035ce 4295 405bea 40 API calls 4293->4295 4294->4263 4294->4297 4295->4298 4439 40140b 4297->4439 4419 403695 4298->4419 4300 405d58 18 API calls 4300->4301 4301->4285 4301->4293 4301->4300 4302 4054e5 2 API calls 4301->4302 4303 4035ba CloseHandle 4301->4303 4434 405bea 4301->4434 4302->4301 4303->4301 4305 406088 GetProcAddress 4304->4305 4306 40607d LoadLibraryA 4304->4306 4307 40325c SHGetFileInfoA 4305->4307 4306->4305 4306->4307 4308 405d36 lstrcpynA 4307->4308 4308->4233 4309->4235 4311 405fa1 5 API calls 4310->4311 4313 4031ef 4311->4313 4312 4031f9 4312->4242 4313->4312 4442 4057c6 lstrlenA CharPrevA 4313->4442 4316 4059f6 2 API calls 4317 403215 4316->4317 4317->4242 4445 4059c7 GetFileAttributesA CreateFileA 4318->4445 4320 402cbc 4347 402cc9 4320->4347 4446 405d36 lstrcpynA 4320->4446 4322 402cdf 4447 40580d lstrlenA 4322->4447 4326 402cf0 GetFileSize 4327 402df1 4326->4327 4329 402d07 4326->4329 4452 402bda 4327->4452 4329->4327 4333 402e8c 4329->4333 4340 402bda 33 API calls 4329->4340 4329->4347 4483 4031b6 4329->4483 4332 402e34 GlobalAlloc 4337 402e4b 4332->4337 4334 402bda 33 API calls 4333->4334 4334->4347 4336 402e15 4339 4031b6 ReadFile 4336->4339 4338 4059f6 2 API calls 4337->4338 4341 402e5c CreateFileA 4338->4341 4342 402e20 4339->4342 4340->4329 4343 402e96 4341->4343 4341->4347 4342->4332 4342->4347 4467 4031cc SetFilePointer 4343->4467 4345 402ea4 4468 402f1f 4345->4468 4347->4250 4349 406061 3 API calls 4348->4349 4350 40379b 4349->4350 4351 4037a1 4350->4351 4352 4037b3 4350->4352 4529 405c94 wsprintfA 4351->4529 4353 405c1d 3 API calls 4352->4353 4354 4037de 4353->4354 4355 4037fc lstrcatA 4354->4355 4357 405c1d 3 API calls 4354->4357 4358 4037b1 4355->4358 4357->4355 4513 403a4c 4358->4513 4361 4058b4 18 API calls 4363 40382e 4361->4363 4362 4038b7 4364 4058b4 18 API calls 4362->4364 4363->4362 4365 405c1d 3 API calls 4363->4365 4366 4038bd 4364->4366 4368 40385a 4365->4368 4367 4038cd LoadImageA 4366->4367 4369 405d58 18 API calls 4366->4369 4370 403973 4367->4370 4371 4038f4 RegisterClassA 4367->4371 4368->4362 4372 403876 lstrlenA 4368->4372 4375 4057f1 CharNextA 4368->4375 4369->4367 4374 40140b 2 API calls 4370->4374 4373 40392a SystemParametersInfoA CreateWindowExA 4371->4373 4401 40397d 4371->4401 4376 403884 lstrcmpiA 4372->4376 4377 4038aa 4372->4377 4373->4370 4378 403979 4374->4378 4379 403874 4375->4379 4376->4377 4380 403894 GetFileAttributesA 4376->4380 4381 4057c6 3 API calls 4377->4381 4383 403a4c 19 API calls 4378->4383 4378->4401 4379->4372 4382 4038a0 4380->4382 4384 4038b0 4381->4384 4382->4377 4385 40580d 2 API calls 4382->4385 4386 40398a 4383->4386 4530 405d36 lstrcpynA 4384->4530 4385->4377 4388 403996 ShowWindow LoadLibraryA 4386->4388 4389 403a19 4386->4389 4391 4039b5 LoadLibraryA 4388->4391 4392 4039bc GetClassInfoA 4388->4392 4522 4050f1 OleInitialize 4389->4522 4391->4392 4394 4039d0 GetClassInfoA RegisterClassA 4392->4394 4395 4039e6 DialogBoxParamA 4392->4395 4393 403a1f 4397 403a23 4393->4397 4398 403a3b 4393->4398 4394->4395 4396 40140b 2 API calls 4395->4396 4396->4401 4400 40140b 2 API calls 4397->4400 4397->4401 4399 40140b 2 API calls 4398->4399 4399->4401 4400->4401 4401->4298 4402->4240 4539 405d36 lstrcpynA 4403->4539 4405 4058c5 4406 40585f 4 API calls 4405->4406 4407 4058cb 4406->4407 4408 4034a3 4407->4408 4409 405fa1 5 API calls 4407->4409 4408->4298 4417 405d36 lstrcpynA 4408->4417 4415 4058db 4409->4415 4410 405906 lstrlenA 4411 405911 4410->4411 4410->4415 4413 4057c6 3 API calls 4411->4413 4414 405916 GetFileAttributesA 4413->4414 4414->4408 4415->4408 4415->4410 4416 40580d 2 API calls 4415->4416 4540 40603a FindFirstFileA 4415->4540 4416->4410 4417->4282 4418->4287 4420 4036b0 4419->4420 4421 4036a6 CloseHandle 4419->4421 4422 4036c4 4420->4422 4423 4036ba CloseHandle 4420->4423 4421->4420 4543 4036f2 4422->4543 4423->4422 4431 40555f 4428->4431 4429 4034f4 ExitProcess 4430 405573 MessageBoxIndirectA 4430->4429 4431->4429 4431->4430 4432->4273 4433->4301 4435 406061 3 API calls 4434->4435 4436 405bf1 4435->4436 4438 405c12 4436->4438 4597 405a6e lstrcpyA 4436->4597 4438->4301 4440 401389 2 API calls 4439->4440 4441 401420 4440->4441 4441->4263 4443 4057e0 lstrcatA 4442->4443 4444 403201 CreateDirectoryA 4442->4444 4443->4444 4444->4316 4445->4320 4446->4322 4448 40581a 4447->4448 4449 402ce5 4448->4449 4450 40581f CharPrevA 4448->4450 4451 405d36 lstrcpynA 4449->4451 4450->4448 4450->4449 4451->4326 4453 402c00 4452->4453 4454 402be8 4452->4454 4456 402c10 GetTickCount 4453->4456 4457 402c08 4453->4457 4455 402bf1 DestroyWindow 4454->4455 4462 402bf8 4454->4462 4455->4462 4459 402c1e 4456->4459 4456->4462 4458 40609a 2 API calls 4457->4458 4458->4462 4460 402c53 CreateDialogParamA ShowWindow 4459->4460 4461 402c26 4459->4461 4460->4462 4461->4462 4487 402bbe 4461->4487 4462->4332 4462->4347 4486 4031cc SetFilePointer 4462->4486 4464 402c34 wsprintfA 4465 40501f 25 API calls 4464->4465 4466 402c51 4465->4466 4466->4462 4467->4345 4469 402f4b 4468->4469 4470 402f2f SetFilePointer 4468->4470 4490 40303a GetTickCount 4469->4490 4470->4469 4475 40303a 43 API calls 4476 402f82 4475->4476 4477 402ffc ReadFile 4476->4477 4479 402ff6 4476->4479 4482 402f92 4476->4482 4477->4479 4479->4347 4480 405a3f ReadFile 4480->4482 4481 402fc5 WriteFile 4481->4479 4481->4482 4482->4479 4482->4480 4482->4481 4484 405a3f ReadFile 4483->4484 4485 4031c9 4484->4485 4485->4329 4486->4336 4488 402bcd 4487->4488 4489 402bcf MulDiv 4487->4489 4488->4489 4489->4464 4491 4031a4 4490->4491 4492 403069 4490->4492 4493 402bda 33 API calls 4491->4493 4505 4031cc SetFilePointer 4492->4505 4500 402f52 4493->4500 4495 403074 SetFilePointer 4499 403099 4495->4499 4496 4031b6 ReadFile 4496->4499 4498 402bda 33 API calls 4498->4499 4499->4496 4499->4498 4499->4500 4501 40312e WriteFile 4499->4501 4502 403185 SetFilePointer 4499->4502 4506 406161 4499->4506 4500->4479 4503 405a3f ReadFile 4500->4503 4501->4499 4501->4500 4502->4491 4504 402f6b 4503->4504 4504->4475 4504->4479 4505->4495 4507 406186 4506->4507 4510 40618e 4506->4510 4507->4499 4508 406215 GlobalFree 4509 40621e GlobalAlloc 4508->4509 4509->4507 4509->4510 4510->4507 4510->4508 4510->4509 4510->4510 4511 406295 GlobalAlloc 4510->4511 4512 40628c GlobalFree 4510->4512 4511->4507 4511->4510 4512->4511 4514 403a60 4513->4514 4531 405c94 wsprintfA 4514->4531 4516 403ad1 4517 405d58 18 API calls 4516->4517 4518 403add SetWindowTextA 4517->4518 4519 40380c 4518->4519 4520 403af9 4518->4520 4519->4361 4520->4519 4521 405d58 18 API calls 4520->4521 4521->4520 4532 404038 4522->4532 4524 40513b 4525 404038 SendMessageA 4524->4525 4527 40514d OleUninitialize 4525->4527 4526 405114 4526->4524 4535 401389 4526->4535 4527->4393 4529->4358 4530->4362 4531->4516 4533 404050 4532->4533 4534 404041 SendMessageA 4532->4534 4533->4526 4534->4533 4537 401390 4535->4537 4536 4013fe 4536->4526 4537->4536 4538 4013cb MulDiv SendMessageA 4537->4538 4538->4537 4539->4405 4541 406050 FindClose 4540->4541 4542 40605b 4540->4542 4541->4542 4542->4415 4544 403700 4543->4544 4545 4036c9 4544->4545 4546 403705 FreeLibrary GlobalFree 4544->4546 4547 4055f6 4545->4547 4546->4545 4546->4546 4548 4058b4 18 API calls 4547->4548 4549 405616 4548->4549 4550 405635 4549->4550 4551 40561e DeleteFileA 4549->4551 4552 405763 4550->4552 4584 405d36 lstrcpynA 4550->4584 4580 4034d6 OleUninitialize 4551->4580 4557 40603a 2 API calls 4552->4557 4552->4580 4554 40565b 4555 405661 lstrcatA 4554->4555 4556 40566e 4554->4556 4558 405674 4555->4558 4559 40580d 2 API calls 4556->4559 4561 405787 4557->4561 4560 405682 lstrcatA 4558->4560 4562 40568d lstrlenA FindFirstFileA 4558->4562 4559->4558 4560->4562 4563 4057c6 3 API calls 4561->4563 4561->4580 4562->4552 4566 4056b1 4562->4566 4565 405791 4563->4565 4564 4057f1 CharNextA 4564->4566 4567 4055ae 5 API calls 4565->4567 4566->4564 4572 405742 FindNextFileA 4566->4572 4579 4055f6 64 API calls 4566->4579 4581 40501f 25 API calls 4566->4581 4582 40501f 25 API calls 4566->4582 4583 405bea 40 API calls 4566->4583 4585 405d36 lstrcpynA 4566->4585 4586 4055ae 4566->4586 4568 40579d 4567->4568 4569 4057b7 4568->4569 4570 4057a1 4568->4570 4571 40501f 25 API calls 4569->4571 4574 40501f 25 API calls 4570->4574 4570->4580 4571->4580 4572->4566 4575 40575a FindClose 4572->4575 4576 4057ae 4574->4576 4575->4552 4577 405bea 40 API calls 4576->4577 4577->4580 4579->4566 4580->4261 4580->4262 4581->4572 4582->4566 4583->4566 4584->4554 4585->4566 4594 4059a2 GetFileAttributesA 4586->4594 4589 4055db 4589->4566 4590 4055d1 DeleteFileA 4592 4055d7 4590->4592 4591 4055c9 RemoveDirectoryA 4591->4592 4592->4589 4593 4055e7 SetFileAttributesA 4592->4593 4593->4589 4595 4055ba 4594->4595 4596 4059b4 SetFileAttributesA 4594->4596 4595->4589 4595->4590 4595->4591 4596->4595 4598 405a97 4597->4598 4599 405abd GetShortPathNameA 4597->4599 4622 4059c7 GetFileAttributesA CreateFileA 4598->4622 4601 405ad2 4599->4601 4602 405be4 4599->4602 4601->4602 4604 405ada wsprintfA 4601->4604 4602->4438 4603 405aa1 CloseHandle GetShortPathNameA 4603->4602 4605 405ab5 4603->4605 4606 405d58 18 API calls 4604->4606 4605->4599 4605->4602 4607 405b02 4606->4607 4623 4059c7 GetFileAttributesA CreateFileA 4607->4623 4609 405b0f 4609->4602 4610 405b1e GetFileSize GlobalAlloc 4609->4610 4611 405b40 4610->4611 4612 405bdd CloseHandle 4610->4612 4613 405a3f ReadFile 4611->4613 4612->4602 4614 405b48 4613->4614 4614->4612 4624 40592c lstrlenA 4614->4624 4617 405b73 4619 40592c 4 API calls 4617->4619 4618 405b5f lstrcpyA 4620 405b81 4618->4620 4619->4620 4621 405bb8 SetFilePointer WriteFile GlobalFree 4620->4621 4621->4612 4622->4603 4623->4609 4625 40596d lstrlenA 4624->4625 4626 405975 4625->4626 4627 405946 lstrcmpiA 4625->4627 4626->4617 4626->4618 4627->4626 4628 405964 CharNextA 4627->4628 4628->4625 5278 10001058 5280 10001074 5278->5280 5279 100010dc 5280->5279 5281 100014bb GlobalFree 5280->5281 5282 10001091 5280->5282 5281->5282 5283 100014bb GlobalFree 5282->5283 5284 100010a1 5283->5284 5285 100010b1 5284->5285 5286 100010a8 GlobalSize 5284->5286 5287 100010b5 GlobalAlloc 5285->5287 5288 100010c6 5285->5288 5286->5285 5289 100014e2 3 API calls 5287->5289 5290 100010d1 GlobalFree 5288->5290 5289->5288 5290->5279 4647 403b19 4648 403b31 4647->4648 4649 403c6c 4647->4649 4648->4649 4650 403b3d 4648->4650 4651 403cbd 4649->4651 4652 403c7d GetDlgItem GetDlgItem 4649->4652 4653 403b48 SetWindowPos 4650->4653 4654 403b5b 4650->4654 4656 403d17 4651->4656 4664 401389 2 API calls 4651->4664 4655 403fec 19 API calls 4652->4655 4653->4654 4658 403b60 ShowWindow 4654->4658 4659 403b78 4654->4659 4660 403ca7 SetClassLongA 4655->4660 4657 404038 SendMessageA 4656->4657 4677 403c67 4656->4677 4687 403d29 4657->4687 4658->4659 4661 403b80 DestroyWindow 4659->4661 4662 403b9a 4659->4662 4663 40140b 2 API calls 4660->4663 4716 403f75 4661->4716 4665 403bb0 4662->4665 4666 403b9f SetWindowLongA 4662->4666 4663->4651 4667 403cef 4664->4667 4671 403c59 4665->4671 4672 403bbc GetDlgItem 4665->4672 4666->4677 4667->4656 4668 403cf3 SendMessageA 4667->4668 4668->4677 4669 40140b 2 API calls 4669->4687 4670 403f77 DestroyWindow EndDialog 4670->4716 4726 404053 4671->4726 4675 403bec 4672->4675 4676 403bcf SendMessageA IsWindowEnabled 4672->4676 4674 403fa6 ShowWindow 4674->4677 4679 403bf9 4675->4679 4680 403c40 SendMessageA 4675->4680 4681 403c0c 4675->4681 4690 403bf1 4675->4690 4676->4675 4676->4677 4678 405d58 18 API calls 4678->4687 4679->4680 4679->4690 4680->4671 4684 403c14 4681->4684 4685 403c29 4681->4685 4683 403fec 19 API calls 4683->4687 4688 40140b 2 API calls 4684->4688 4689 40140b 2 API calls 4685->4689 4686 403c27 4686->4671 4687->4669 4687->4670 4687->4677 4687->4678 4687->4683 4707 403eb7 DestroyWindow 4687->4707 4717 403fec 4687->4717 4688->4690 4691 403c30 4689->4691 4723 403fc5 4690->4723 4691->4671 4691->4690 4693 403da4 GetDlgItem 4694 403dc1 ShowWindow KiUserCallbackDispatcher 4693->4694 4695 403db9 4693->4695 4720 40400e KiUserCallbackDispatcher 4694->4720 4695->4694 4697 403deb EnableWindow 4701 403dff 4697->4701 4698 403e04 GetSystemMenu EnableMenuItem SendMessageA 4699 403e34 SendMessageA 4698->4699 4698->4701 4699->4701 4701->4698 4721 404021 SendMessageA 4701->4721 4722 405d36 lstrcpynA 4701->4722 4703 403e62 lstrlenA 4704 405d58 18 API calls 4703->4704 4705 403e73 SetWindowTextA 4704->4705 4706 401389 2 API calls 4705->4706 4706->4687 4708 403ed1 CreateDialogParamA 4707->4708 4707->4716 4709 403f04 4708->4709 4708->4716 4710 403fec 19 API calls 4709->4710 4711 403f0f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4710->4711 4712 401389 2 API calls 4711->4712 4713 403f55 4712->4713 4713->4677 4714 403f5d ShowWindow 4713->4714 4715 404038 SendMessageA 4714->4715 4715->4716 4716->4674 4716->4677 4718 405d58 18 API calls 4717->4718 4719 403ff7 SetDlgItemTextA 4718->4719 4719->4693 4720->4697 4721->4701 4722->4703 4724 403fd2 SendMessageA 4723->4724 4725 403fcc 4723->4725 4724->4686 4725->4724 4727 40406b GetWindowLongA 4726->4727 4737 4040f4 4726->4737 4728 40407c 4727->4728 4727->4737 4729 40408b GetSysColor 4728->4729 4730 40408e 4728->4730 4729->4730 4731 404094 SetTextColor 4730->4731 4732 40409e SetBkMode 4730->4732 4731->4732 4733 4040b6 GetSysColor 4732->4733 4734 4040bc 4732->4734 4733->4734 4735 4040c3 SetBkColor 4734->4735 4736 4040cd 4734->4736 4735->4736 4736->4737 4738 4040e0 DeleteObject 4736->4738 4739 4040e7 CreateBrushIndirect 4736->4739 4737->4677 4738->4739 4739->4737 4740 402519 4741 4029e0 18 API calls 4740->4741 4745 402523 4741->4745 4742 40258d 4743 405a3f ReadFile 4743->4745 4744 40258f 4749 405c94 wsprintfA 4744->4749 4745->4742 4745->4743 4745->4744 4746 40259f 4745->4746 4746->4742 4748 4025b5 SetFilePointer 4746->4748 4748->4742 4749->4742 4775 40231c 4776 402322 4775->4776 4777 4029fd 18 API calls 4776->4777 4778 402334 4777->4778 4779 4029fd 18 API calls 4778->4779 4780 40233e RegCreateKeyExA 4779->4780 4781 402663 4780->4781 4782 402368 4780->4782 4783 402380 4782->4783 4784 4029fd 18 API calls 4782->4784 4785 40238c 4783->4785 4788 4029e0 18 API calls 4783->4788 4787 402379 lstrlenA 4784->4787 4786 4023a7 RegSetValueExA 4785->4786 4789 402f1f 46 API calls 4785->4789 4790 4023bd RegCloseKey 4786->4790 4787->4783 4788->4785 4789->4786 4790->4781 5298 40261c 5299 402637 5298->5299 5300 40261f 5298->5300 5302 4027bd 5299->5302 5304 405d36 lstrcpynA 5299->5304 5301 40262c FindNextFileA 5300->5301 5301->5299 5304->5302 5305 40499c GetDlgItem GetDlgItem 5306 4049ee 7 API calls 5305->5306 5348 404c06 5305->5348 5307 404a91 DeleteObject 5306->5307 5308 404a84 SendMessageA 5306->5308 5309 404a9a 5307->5309 5308->5307 5311 404ad1 5309->5311 5312 405d58 18 API calls 5309->5312 5310 404cea 5314 404d96 5310->5314 5319 404bf9 5310->5319 5324 404d43 SendMessageA 5310->5324 5313 403fec 19 API calls 5311->5313 5315 404ab3 SendMessageA SendMessageA 5312->5315 5318 404ae5 5313->5318 5316 404da0 SendMessageA 5314->5316 5317 404da8 5314->5317 5315->5309 5316->5317 5326 404dc1 5317->5326 5327 404dba ImageList_Destroy 5317->5327 5335 404dd1 5317->5335 5323 403fec 19 API calls 5318->5323 5320 404053 8 API calls 5319->5320 5325 404f8c 5320->5325 5321 404cdc SendMessageA 5321->5310 5322 4048ea 5 API calls 5338 404c77 5322->5338 5339 404af3 5323->5339 5324->5319 5329 404d58 SendMessageA 5324->5329 5330 404dca GlobalFree 5326->5330 5326->5335 5327->5326 5328 404f40 5328->5319 5333 404f52 ShowWindow GetDlgItem ShowWindow 5328->5333 5332 404d6b 5329->5332 5330->5335 5331 404bc7 GetWindowLongA SetWindowLongA 5334 404be0 5331->5334 5340 404d7c SendMessageA 5332->5340 5333->5319 5336 404be6 ShowWindow 5334->5336 5337 404bfe 5334->5337 5335->5328 5347 40496a 4 API calls 5335->5347 5352 404e0c 5335->5352 5356 404021 SendMessageA 5336->5356 5357 404021 SendMessageA 5337->5357 5338->5310 5338->5321 5339->5331 5341 404bc1 5339->5341 5344 404b42 SendMessageA 5339->5344 5345 404b7e SendMessageA 5339->5345 5346 404b8f SendMessageA 5339->5346 5340->5314 5341->5331 5341->5334 5344->5339 5345->5339 5346->5339 5347->5352 5348->5310 5348->5322 5348->5338 5349 404f16 InvalidateRect 5349->5328 5350 404f2c 5349->5350 5358 4048a5 5350->5358 5351 404e3a SendMessageA 5355 404e50 5351->5355 5352->5351 5352->5355 5354 404ec4 SendMessageA SendMessageA 5354->5355 5355->5349 5355->5354 5356->5319 5357->5348 5361 4047e0 5358->5361 5360 4048ba 5360->5328 5362 4047f6 5361->5362 5363 405d58 18 API calls 5362->5363 5364 40485a 5363->5364 5365 405d58 18 API calls 5364->5365 5366 404865 5365->5366 5367 405d58 18 API calls 5366->5367 5368 40487b lstrlenA wsprintfA SetDlgItemTextA 5367->5368 5368->5360 5369 100010e0 5370 1000110e 5369->5370 5371 100011c4 GlobalFree 5370->5371 5372 100012ad 2 API calls 5370->5372 5373 100011c3 5370->5373 5374 10001266 2 API calls 5370->5374 5375 10001155 GlobalAlloc 5370->5375 5376 100011ea GlobalFree 5370->5376 5377 100011b1 GlobalFree 5370->5377 5378 100012d1 lstrcpyA 5370->5378 5372->5370 5373->5371 5374->5377 5375->5370 5376->5370 5377->5370 5378->5370 5379 4016a1 5380 4029fd 18 API calls 5379->5380 5381 4016a7 GetFullPathNameA 5380->5381 5382 4016be 5381->5382 5383 4016df 5381->5383 5382->5383 5386 40603a 2 API calls 5382->5386 5384 402892 5383->5384 5385 4016f3 GetShortPathNameA 5383->5385 5385->5384 5387 4016cf 5386->5387 5387->5383 5389 405d36 lstrcpynA 5387->5389 5389->5383 5390 10002162 5391 100021c0 5390->5391 5393 100021f6 5390->5393 5392 100021d2 GlobalAlloc 5391->5392 5391->5393 5392->5391 5394 401d26 GetDC GetDeviceCaps 5395 4029e0 18 API calls 5394->5395 5396 401d44 MulDiv ReleaseDC 5395->5396 5397 4029e0 18 API calls 5396->5397 5398 401d63 5397->5398 5399 405d58 18 API calls 5398->5399 5400 401d9c CreateFontIndirectA 5399->5400 5401 4024cb 5400->5401 5402 40442a 5403 404456 5402->5403 5404 404467 5402->5404 5463 40552e GetDlgItemTextA 5403->5463 5406 404473 GetDlgItem 5404->5406 5407 4044d2 5404->5407 5410 404487 5406->5410 5408 4045b6 5407->5408 5417 405d58 18 API calls 5407->5417 5461 40475f 5407->5461 5408->5461 5465 40552e GetDlgItemTextA 5408->5465 5409 404461 5411 405fa1 5 API calls 5409->5411 5412 40449b SetWindowTextA 5410->5412 5415 40585f 4 API calls 5410->5415 5411->5404 5416 403fec 19 API calls 5412->5416 5414 404053 8 API calls 5419 404773 5414->5419 5420 404491 5415->5420 5421 4044b7 5416->5421 5422 404546 SHBrowseForFolderA 5417->5422 5418 4045e6 5423 4058b4 18 API calls 5418->5423 5420->5412 5427 4057c6 3 API calls 5420->5427 5424 403fec 19 API calls 5421->5424 5422->5408 5425 40455e CoTaskMemFree 5422->5425 5426 4045ec 5423->5426 5428 4044c5 5424->5428 5429 4057c6 3 API calls 5425->5429 5466 405d36 lstrcpynA 5426->5466 5427->5412 5464 404021 SendMessageA 5428->5464 5431 40456b 5429->5431 5434 4045a2 SetDlgItemTextA 5431->5434 5438 405d58 18 API calls 5431->5438 5433 4044cb 5436 406061 3 API calls 5433->5436 5434->5408 5435 404603 5437 406061 3 API calls 5435->5437 5436->5407 5444 40460b 5437->5444 5440 40458a lstrcmpiA 5438->5440 5439 404645 5467 405d36 lstrcpynA 5439->5467 5440->5434 5441 40459b lstrcatA 5440->5441 5441->5434 5443 40464e 5445 40585f 4 API calls 5443->5445 5444->5439 5449 40580d 2 API calls 5444->5449 5450 40469d 5444->5450 5446 404654 GetDiskFreeSpaceA 5445->5446 5448 404676 MulDiv 5446->5448 5446->5450 5448->5450 5449->5444 5451 40470e 5450->5451 5453 4048a5 21 API calls 5450->5453 5452 404731 5451->5452 5454 40140b 2 API calls 5451->5454 5468 40400e KiUserCallbackDispatcher 5452->5468 5455 4046fb 5453->5455 5454->5452 5457 404710 SetDlgItemTextA 5455->5457 5458 404700 5455->5458 5457->5451 5459 4047e0 21 API calls 5458->5459 5459->5451 5460 40474d 5460->5461 5469 4043bf 5460->5469 5461->5414 5463->5409 5464->5433 5465->5418 5466->5435 5467->5443 5468->5460 5470 4043d2 SendMessageA 5469->5470 5471 4043cd 5469->5471 5470->5461 5471->5470 4106 40172c 4107 4029fd 18 API calls 4106->4107 4108 401733 4107->4108 4112 4059f6 4108->4112 4110 40173a 4111 4059f6 2 API calls 4110->4111 4111->4110 4113 405a01 GetTickCount GetTempFileNameA 4112->4113 4114 405a32 4113->4114 4115 405a2e 4113->4115 4114->4110 4115->4113 4115->4114 4116 401dac 4124 4029e0 4116->4124 4118 401db2 4119 4029e0 18 API calls 4118->4119 4120 401dbb 4119->4120 4121 401dc2 ShowWindow 4120->4121 4122 401dcd EnableWindow 4120->4122 4123 402892 4121->4123 4122->4123 4125 405d58 18 API calls 4124->4125 4126 4029f4 4125->4126 4126->4118 5472 401eac 5473 4029fd 18 API calls 5472->5473 5474 401eb3 5473->5474 5475 40603a 2 API calls 5474->5475 5476 401eb9 5475->5476 5478 401ecb 5476->5478 5479 405c94 wsprintfA 5476->5479 5479->5478 5480 40192d 5481 4029fd 18 API calls 5480->5481 5482 401934 lstrlenA 5481->5482 5483 4024cb 5482->5483 5484 4024af 5485 4029fd 18 API calls 5484->5485 5486 4024b6 5485->5486 5489 4059c7 GetFileAttributesA CreateFileA 5486->5489 5488 4024c2 5489->5488 5497 401cb0 5498 4029e0 18 API calls 5497->5498 5499 401cc0 SetWindowLongA 5498->5499 5500 402892 5499->5500 5501 401a31 5502 4029e0 18 API calls 5501->5502 5503 401a37 5502->5503 5504 4029e0 18 API calls 5503->5504 5505 4019e1 5504->5505 4145 401e32 4146 4029fd 18 API calls 4145->4146 4147 401e38 4146->4147 4148 40501f 25 API calls 4147->4148 4149 401e42 4148->4149 4160 4054e5 CreateProcessA 4149->4160 4151 401e9e CloseHandle 4153 402663 4151->4153 4152 401e67 WaitForSingleObject 4154 401e48 4152->4154 4155 401e75 GetExitCodeProcess 4152->4155 4154->4151 4154->4152 4154->4153 4163 40609a 4154->4163 4157 401e87 4155->4157 4158 401e90 4155->4158 4167 405c94 wsprintfA 4157->4167 4158->4151 4161 405524 4160->4161 4162 405518 CloseHandle 4160->4162 4161->4154 4162->4161 4164 4060b7 PeekMessageA 4163->4164 4165 4060c7 4164->4165 4166 4060ad DispatchMessageA 4164->4166 4165->4152 4166->4164 4167->4158 4177 4015b3 4178 4029fd 18 API calls 4177->4178 4179 4015ba 4178->4179 4195 40585f CharNextA CharNextA 4179->4195 4181 40160a 4182 40160f 4181->4182 4185 401638 4181->4185 4184 401423 25 API calls 4182->4184 4183 4057f1 CharNextA 4186 4015d0 CreateDirectoryA 4183->4186 4187 401616 4184->4187 4190 401423 25 API calls 4185->4190 4188 4015c2 4186->4188 4189 4015e5 GetLastError 4186->4189 4201 405d36 lstrcpynA 4187->4201 4188->4181 4188->4183 4189->4188 4192 4015f2 GetFileAttributesA 4189->4192 4194 401630 4190->4194 4192->4188 4193 401621 SetCurrentDirectoryA 4193->4194 4196 40587a 4195->4196 4198 40588a 4195->4198 4196->4198 4199 405885 CharNextA 4196->4199 4197 4058aa 4197->4188 4198->4197 4200 4057f1 CharNextA 4198->4200 4199->4197 4200->4198 4201->4193 5506 404135 5507 40414b 5506->5507 5511 404257 5506->5511 5510 403fec 19 API calls 5507->5510 5508 4042c6 5509 4042d0 GetDlgItem 5508->5509 5512 40439a 5508->5512 5516 4042e6 5509->5516 5517 404358 5509->5517 5513 4041a1 5510->5513 5511->5508 5511->5512 5518 40429b GetDlgItem SendMessageA 5511->5518 5514 404053 8 API calls 5512->5514 5515 403fec 19 API calls 5513->5515 5519 404395 5514->5519 5520 4041ae CheckDlgButton 5515->5520 5516->5517 5521 40430c 6 API calls 5516->5521 5517->5512 5522 40436a 5517->5522 5537 40400e KiUserCallbackDispatcher 5518->5537 5535 40400e KiUserCallbackDispatcher 5520->5535 5521->5517 5525 404370 SendMessageA 5522->5525 5526 404381 5522->5526 5525->5526 5526->5519 5529 404387 SendMessageA 5526->5529 5527 4042c1 5530 4043bf SendMessageA 5527->5530 5528 4041cc GetDlgItem 5536 404021 SendMessageA 5528->5536 5529->5519 5530->5508 5532 4041e2 SendMessageA 5533 404200 GetSysColor 5532->5533 5534 404209 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5532->5534 5533->5534 5534->5519 5535->5528 5536->5532 5537->5527 4211 402036 4212 4029fd 18 API calls 4211->4212 4213 40203d 4212->4213 4214 4029fd 18 API calls 4213->4214 4215 402047 4214->4215 4216 4029fd 18 API calls 4215->4216 4217 402051 4216->4217 4218 4029fd 18 API calls 4217->4218 4219 40205b 4218->4219 4220 4029fd 18 API calls 4219->4220 4221 402064 4220->4221 4222 40207a CoCreateInstance 4221->4222 4223 4029fd 18 API calls 4221->4223 4226 402099 4222->4226 4227 40214d 4222->4227 4223->4222 4224 401423 25 API calls 4225 402181 4224->4225 4226->4227 4228 40212f MultiByteToWideChar 4226->4228 4227->4224 4227->4225 4228->4227 5538 4014b7 5539 4014bd 5538->5539 5540 401389 2 API calls 5539->5540 5541 4014c5 5540->5541 5542 401bb8 5543 4029e0 18 API calls 5542->5543 5544 401bbf 5543->5544 5545 4029e0 18 API calls 5544->5545 5546 401bc9 5545->5546 5547 401bd9 5546->5547 5548 4029fd 18 API calls 5546->5548 5549 4029fd 18 API calls 5547->5549 5553 401be9 5547->5553 5548->5547 5549->5553 5550 401bf4 5554 4029e0 18 API calls 5550->5554 5551 401c38 5552 4029fd 18 API calls 5551->5552 5555 401c3d 5552->5555 5553->5550 5553->5551 5556 401bf9 5554->5556 5557 4029fd 18 API calls 5555->5557 5558 4029e0 18 API calls 5556->5558 5559 401c46 FindWindowExA 5557->5559 5560 401c02 5558->5560 5563 401c64 5559->5563 5561 401c28 SendMessageA 5560->5561 5562 401c0a SendMessageTimeoutA 5560->5562 5561->5563 5562->5563 4750 40243a 4761 402b07 4750->4761 4752 402444 4753 4029e0 18 API calls 4752->4753 4754 40244d 4753->4754 4755 402457 4754->4755 4758 402663 4754->4758 4756 402470 RegEnumValueA 4755->4756 4757 402464 RegEnumKeyA 4755->4757 4756->4758 4759 402489 RegCloseKey 4756->4759 4757->4759 4759->4758 4762 4029fd 18 API calls 4761->4762 4763 402b20 4762->4763 4764 402b2e RegOpenKeyExA 4763->4764 4764->4752 4765 40223b 4766 402243 4765->4766 4767 402249 4765->4767 4768 4029fd 18 API calls 4766->4768 4769 4029fd 18 API calls 4767->4769 4772 402259 4767->4772 4768->4767 4769->4772 4770 4029fd 18 API calls 4773 402267 4770->4773 4771 4029fd 18 API calls 4774 402270 WritePrivateProfileStringA 4771->4774 4772->4770 4772->4773 4773->4771 4849 40173f 4850 4029fd 18 API calls 4849->4850 4851 401746 4850->4851 4852 401764 4851->4852 4853 40176c 4851->4853 4888 405d36 lstrcpynA 4852->4888 4889 405d36 lstrcpynA 4853->4889 4856 40176a 4860 405fa1 5 API calls 4856->4860 4857 401777 4858 4057c6 3 API calls 4857->4858 4859 40177d lstrcatA 4858->4859 4859->4856 4881 401789 4860->4881 4861 40603a 2 API calls 4861->4881 4862 4059a2 2 API calls 4862->4881 4864 4017a0 CompareFileTime 4864->4881 4865 401864 4867 40501f 25 API calls 4865->4867 4866 40183b 4868 40501f 25 API calls 4866->4868 4875 401850 4866->4875 4869 40186e 4867->4869 4868->4875 4870 402f1f 46 API calls 4869->4870 4871 401881 4870->4871 4872 401895 SetFileTime 4871->4872 4874 4018a7 CloseHandle 4871->4874 4872->4874 4873 405d58 18 API calls 4873->4881 4874->4875 4876 4018b8 4874->4876 4878 4018d0 4876->4878 4879 4018bd 4876->4879 4877 405d36 lstrcpynA 4877->4881 4880 405d58 18 API calls 4878->4880 4882 405d58 18 API calls 4879->4882 4884 4018d8 4880->4884 4881->4861 4881->4862 4881->4864 4881->4865 4881->4866 4881->4873 4881->4877 4885 40554a MessageBoxIndirectA 4881->4885 4887 4059c7 GetFileAttributesA CreateFileA 4881->4887 4883 4018c5 lstrcatA 4882->4883 4883->4884 4886 40554a MessageBoxIndirectA 4884->4886 4885->4881 4886->4875 4887->4881 4888->4856 4889->4857 5564 40163f 5565 4029fd 18 API calls 5564->5565 5566 401645 5565->5566 5567 40603a 2 API calls 5566->5567 5568 40164b 5567->5568 5569 40193f 5570 4029e0 18 API calls 5569->5570 5571 401946 5570->5571 5572 4029e0 18 API calls 5571->5572 5573 401950 5572->5573 5574 4029fd 18 API calls 5573->5574 5575 401959 5574->5575 5576 40196c lstrlenA 5575->5576 5577 4019a7 5575->5577 5578 401976 5576->5578 5578->5577 5582 405d36 lstrcpynA 5578->5582 5580 401990 5580->5577 5581 40199d lstrlenA 5580->5581 5581->5577 5582->5580

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403217-4032ae #17 SetErrorMode OleInitialize call 406061 SHGetFileInfoA call 405d36 GetCommandLineA call 405d36 GetModuleHandleA 7 4032b0-4032b5 0->7 8 4032ba-4032cf call 4057f1 CharNextA 0->8 7->8 11 403394-403398 8->11 12 4032d4-4032d7 11->12 13 40339e 11->13 14 4032d9-4032dd 12->14 15 4032df-4032e7 12->15 16 4033b1-4033cb GetTempPathA call 4031e3 13->16 14->14 14->15 17 4032e9-4032ea 15->17 18 4032ef-4032f2 15->18 26 403423-40343d DeleteFileA call 402c79 16->26 27 4033cd-4033eb GetWindowsDirectoryA lstrcatA call 4031e3 16->27 17->18 20 403384-403391 call 4057f1 18->20 21 4032f8-4032fc 18->21 20->11 36 403393 20->36 24 403314-403341 21->24 25 4032fe-403304 21->25 32 403343-403349 24->32 33 403354-403382 24->33 30 403306-403308 25->30 31 40330a 25->31 41 4034d1-4034e0 call 403695 OleUninitialize 26->41 42 403443-403449 26->42 27->26 44 4033ed-40341d GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031e3 27->44 30->24 30->31 31->24 38 40334b-40334d 32->38 39 40334f 32->39 33->20 35 4033a0-4033ac call 405d36 33->35 35->16 36->11 38->33 38->39 39->33 55 4034e6-4034f6 call 40554a ExitProcess 41->55 56 4035da-4035e0 41->56 46 4034c1-4034c8 call 403787 42->46 47 40344b-403456 call 4057f1 42->47 44->26 44->41 53 4034cd 46->53 59 403458-403481 47->59 60 40348c-403496 47->60 53->41 57 4035e6-403603 call 406061 * 3 56->57 58 40367d-403685 56->58 89 403605-403607 57->89 90 40364d-40365b call 406061 57->90 62 403687 58->62 63 40368b-40368f ExitProcess 58->63 65 403483-403485 59->65 66 403498-4034a5 call 4058b4 60->66 67 4034fc-403516 lstrcatA lstrcmpiA 60->67 62->63 65->60 70 403487-40348a 65->70 66->41 77 4034a7-4034bd call 405d36 * 2 66->77 67->41 72 403518-40352d CreateDirectoryA SetCurrentDirectoryA 67->72 70->60 70->65 73 40353a-403562 call 405d36 72->73 74 40352f-403535 call 405d36 72->74 85 403568-403584 call 405d58 DeleteFileA 73->85 74->73 77->46 95 4035c5-4035cc 85->95 96 403586-403596 CopyFileA 85->96 89->90 94 403609-40360b 89->94 101 403669-403674 ExitWindowsEx 90->101 102 40365d-403667 90->102 94->90 98 40360d-40361f GetCurrentProcess 94->98 95->85 99 4035ce-4035d5 call 405bea 95->99 96->95 100 403598-4035b8 call 405bea call 405d58 call 4054e5 96->100 98->90 107 403621-403643 98->107 99->41 100->95 117 4035ba-4035c1 CloseHandle 100->117 101->58 106 403676-403678 call 40140b 101->106 102->101 102->106 106->58 107->90 117->95
                          APIs
                          • #17.COMCTL32 ref: 00403238
                          • SetErrorMode.KERNELBASE(00008001), ref: 00403243
                          • OleInitialize.OLE32(00000000), ref: 0040324A
                            • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                            • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                            • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,00000160,00000000,00000009), ref: 00403272
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                          • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                          • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",00000000), ref: 0040329A
                          • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",00000020), ref: 004032C5
                          • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033C2
                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033D3
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033DF
                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F3
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FB
                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040340C
                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403414
                          • DeleteFileA.KERNELBASE(1033), ref: 00403428
                          • OleUninitialize.OLE32(?), ref: 004034D6
                          • ExitProcess.KERNEL32 ref: 004034F6
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",00000000,?), ref: 00403502
                          • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040350E
                          • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040351A
                          • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403521
                          • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,00424000,?), ref: 0040357A
                          • CopyFileA.KERNEL32(C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,0041E8B8,00000001), ref: 0040358E
                          • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                          • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000005,00000004), ref: 00403614
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                          • ExitProcess.KERNEL32 ref: 0040368F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                          • String ID: "$"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$`KXu$~nsu.tmp
                          • API String ID: 4107622049-1115493218
                          • Opcode ID: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                          • Instruction ID: 3d26bb40307c87b2cd60c260c775e6d0301d96a10e68b952128d49a18977981a
                          • Opcode Fuzzy Hash: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                          • Instruction Fuzzy Hash: 85B107706082517AE721AF659D8DA2B3EACEB41706F04447FF541BA1E2C77C9E01CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 118 40515d-405179 119 405308-40530e 118->119 120 40517f-405246 GetDlgItem * 3 call 404021 call 4048bd GetClientRect GetSystemMetrics SendMessageA * 2 118->120 122 405310-405332 GetDlgItem CreateThread CloseHandle 119->122 123 405338-405344 119->123 142 405264-405267 120->142 143 405248-405262 SendMessageA * 2 120->143 122->123 125 405366-40536c 123->125 126 405346-40534c 123->126 127 4053c1-4053c4 125->127 128 40536e-405374 125->128 130 405387-40538e call 404053 126->130 131 40534e-405361 ShowWindow * 2 call 404021 126->131 127->130 136 4053c6-4053cc 127->136 132 405376-405382 call 403fc5 128->132 133 40539a-4053aa ShowWindow 128->133 139 405393-405397 130->139 131->125 132->130 140 4053ba-4053bc call 403fc5 133->140 141 4053ac-4053b5 call 40501f 133->141 136->130 144 4053ce-4053e1 SendMessageA 136->144 140->127 141->140 147 405277-40528e call 403fec 142->147 148 405269-405275 SendMessageA 142->148 143->142 149 4053e7-405413 CreatePopupMenu call 405d58 AppendMenuA 144->149 150 4054de-4054e0 144->150 157 405290-4052a4 ShowWindow 147->157 158 4052c4-4052e5 GetDlgItem SendMessageA 147->158 148->147 155 405415-405425 GetWindowRect 149->155 156 405428-40543e TrackPopupMenu 149->156 150->139 155->156 156->150 159 405444-40545e 156->159 160 4052b3 157->160 161 4052a6-4052b1 ShowWindow 157->161 158->150 162 4052eb-405303 SendMessageA * 2 158->162 163 405463-40547e SendMessageA 159->163 164 4052b9-4052bf call 404021 160->164 161->164 162->150 163->163 165 405480-4054a0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 164->158 167 4054a2-4054c2 SendMessageA 165->167 167->167 168 4054c4-4054d8 GlobalUnlock SetClipboardData CloseClipboard 167->168 168->150
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004051BC
                          • GetDlgItem.USER32(?,000003EE), ref: 004051CB
                          • GetClientRect.USER32(?,?), ref: 00405208
                          • GetSystemMetrics.USER32(00000002), ref: 0040520F
                          • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405230
                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405241
                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405254
                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405262
                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405275
                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405297
                          • ShowWindow.USER32(?,00000008), ref: 004052AB
                          • GetDlgItem.USER32(?,000003EC), ref: 004052CC
                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004052DC
                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052F5
                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405301
                          • GetDlgItem.USER32(?,000003F8), ref: 004051DA
                            • Part of subcall function 00404021: SendMessageA.USER32(00000028,?,00000001,00403E52), ref: 0040402F
                          • GetDlgItem.USER32(?,000003EC), ref: 0040531D
                          • CreateThread.KERNELBASE(00000000,00000000,Function_000050F1,00000000), ref: 0040532B
                          • CloseHandle.KERNELBASE(00000000), ref: 00405332
                          • ShowWindow.USER32(00000000), ref: 00405355
                          • ShowWindow.USER32(?,00000008), ref: 0040535C
                          • ShowWindow.USER32(00000008), ref: 004053A2
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004053D6
                          • CreatePopupMenu.USER32 ref: 004053E7
                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004053FC
                          • GetWindowRect.USER32(?,000000FF), ref: 0040541C
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405435
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405471
                          • OpenClipboard.USER32(00000000), ref: 00405481
                          • EmptyClipboard.USER32 ref: 00405487
                          • GlobalAlloc.KERNEL32(00000042,?), ref: 00405490
                          • GlobalLock.KERNEL32(00000000), ref: 0040549A
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054AE
                          • GlobalUnlock.KERNEL32(00000000), ref: 004054C7
                          • SetClipboardData.USER32(00000001,00000000), ref: 004054D2
                          • CloseClipboard.USER32 ref: 004054D8
                          Strings
                          • Tosporet Setup: Installing, xrefs: 0040544D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: Tosporet Setup: Installing
                          • API String ID: 590372296-1449912710
                          • Opcode ID: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                          • Instruction ID: 24acf85f457993e5d1a00f4a74fbc0a00d7f38a893508f9c9f1f5035b4e63235
                          • Opcode Fuzzy Hash: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                          • Instruction Fuzzy Hash: 5FA15BB1900208BFDB219FA0DD89AAE7F79FB08355F10407AFA04B61A0C7B55E51DF69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 414 405d58-405d63 415 405d65-405d74 414->415 416 405d76-405d8b 414->416 415->416 417 405d91-405d9c 416->417 418 405f7e-405f82 416->418 417->418 419 405da2-405da9 417->419 420 405f88-405f92 418->420 421 405dae-405db8 418->421 419->418 423 405f94-405f98 call 405d36 420->423 424 405f9d-405f9e 420->424 421->420 422 405dbe-405dc5 421->422 426 405f71 422->426 427 405dcb-405e00 422->427 423->424 428 405f73-405f79 426->428 429 405f7b-405f7d 426->429 430 405e06-405e11 GetVersion 427->430 431 405f1b-405f1e 427->431 428->418 429->418 432 405e13-405e17 430->432 433 405e2b 430->433 434 405f20-405f23 431->434 435 405f4e-405f51 431->435 432->433 439 405e19-405e1d 432->439 436 405e32-405e39 433->436 440 405f33-405f3f call 405d36 434->440 441 405f25-405f31 call 405c94 434->441 437 405f53-405f5a call 405d58 435->437 438 405f5f-405f6f lstrlenA 435->438 443 405e3b-405e3d 436->443 444 405e3e-405e40 436->444 437->438 438->418 439->433 447 405e1f-405e23 439->447 451 405f44-405f4a 440->451 441->451 443->444 449 405e42-405e5d call 405c1d 444->449 450 405e79-405e7c 444->450 447->433 452 405e25-405e29 447->452 457 405e62-405e65 449->457 455 405e8c-405e8f 450->455 456 405e7e-405e8a GetSystemDirectoryA 450->456 451->438 454 405f4c 451->454 452->436 458 405f13-405f19 call 405fa1 454->458 460 405e91-405e9f GetWindowsDirectoryA 455->460 461 405ef9-405efb 455->461 459 405efd-405f00 456->459 462 405f02-405f06 457->462 463 405e6b-405e74 call 405d58 457->463 458->438 459->458 459->462 460->461 461->459 464 405ea1-405eab 461->464 462->458 467 405f08-405f0e lstrcatA 462->467 463->459 469 405ec5-405edb SHGetSpecialFolderLocation 464->469 470 405ead-405eb0 464->470 467->458 472 405ef6 469->472 473 405edd-405ef4 SHGetPathFromIDListA CoTaskMemFree 469->473 470->469 471 405eb2-405eb9 470->471 475 405ec1-405ec3 471->475 472->461 473->459 473->472 475->459 475->469
                          APIs
                          • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000), ref: 00405E09
                          • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405E84
                          • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405E97
                          • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405ED3
                          • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00405EE1
                          • CoTaskMemFree.OLE32(00000000), ref: 00405EEC
                          • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F0E
                          • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000), ref: 00405F60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 900638850-3619070476
                          • Opcode ID: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                          • Instruction ID: 9c0e267699f90c8e910d98bdf84d4b8f2614ab6024826f89c9d009b20b1e8bc4
                          • Opcode Fuzzy Hash: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                          • Instruction Fuzzy Hash: 10610571A04905ABDF215F64DC84B7B3BA8DB55304F10813BE641B62D1D33C4A42DF9E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 676 4055f6-40561c call 4058b4 679 405635-40563c 676->679 680 40561e-405630 DeleteFileA 676->680 682 40563e-405640 679->682 683 40564f-40565f call 405d36 679->683 681 4057bf-4057c3 680->681 684 405646-405649 682->684 685 40576d-405772 682->685 691 405661-40566c lstrcatA 683->691 692 40566e-40566f call 40580d 683->692 684->683 684->685 685->681 687 405774-405777 685->687 689 405781-405789 call 40603a 687->689 690 405779-40577f 687->690 689->681 700 40578b-40579f call 4057c6 call 4055ae 689->700 690->681 694 405674-405677 691->694 692->694 696 405682-405688 lstrcatA 694->696 697 405679-405680 694->697 699 40568d-4056ab lstrlenA FindFirstFileA 696->699 697->696 697->699 701 4056b1-4056c8 call 4057f1 699->701 702 405763-405767 699->702 715 4057a1-4057a4 700->715 716 4057b7-4057ba call 40501f 700->716 709 4056d3-4056d6 701->709 710 4056ca-4056ce 701->710 702->685 704 405769 702->704 704->685 713 4056d8-4056dd 709->713 714 4056e9-4056f7 call 405d36 709->714 710->709 712 4056d0 710->712 712->709 719 405742-405754 FindNextFileA 713->719 720 4056df-4056e1 713->720 726 4056f9-405701 714->726 727 40570e-405719 call 4055ae 714->727 715->690 717 4057a6-4057b5 call 40501f call 405bea 715->717 716->681 717->681 719->701 723 40575a-40575d FindClose 719->723 720->714 724 4056e3-4056e7 720->724 723->702 724->714 724->719 726->719 729 405703-40570c call 4055f6 726->729 736 40573a-40573d call 40501f 727->736 737 40571b-40571e 727->737 729->719 736->719 738 405720-405730 call 40501f call 405bea 737->738 739 405732-405738 737->739 738->719 739->719
                          APIs
                          • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040561F
                          • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 00405667
                          • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 00405688
                          • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040568E
                          • FindFirstFileA.KERNELBASE(00420D00,?,?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040569F
                          • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040574C
                          • FindClose.KERNEL32(00000000), ref: 0040575D
                          Strings
                          • \*.*, xrefs: 00405661
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405604
                          • "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe", xrefs: 004055F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-1006310348
                          • Opcode ID: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                          • Instruction ID: a1a18f6d4a87cf364f513f4d5348cf8987bf6841df45d5f239a42b9e89fe31fb
                          • Opcode Fuzzy Hash: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                          • Instruction Fuzzy Hash: 8051D230905A04FADB216B618C89BBF7AB8DF42714F54803BF445721D2D73C4942EE6E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                          • Instruction ID: 49e2905b870d629617cd54a3ad4ea64d750052a334705c7e6b68d35cedeefd19
                          • Opcode Fuzzy Hash: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                          • Instruction Fuzzy Hash: 28F17970D00229CBCF28CFA8C8946ADBBB1FF45305F25856ED856BB281D3785A96CF45
                          APIs
                          • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040208B
                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407374,?,?), ref: 00402143
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 004020CB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ByteCharCreateInstanceMultiWide
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 123533781-862733243
                          • Opcode ID: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                          • Instruction ID: 1053df79af30500630abfeafbcf843dcec04d0d4e3091bc204b5fde3a4f6985c
                          • Opcode Fuzzy Hash: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                          • Instruction Fuzzy Hash: 3B416D71A00209BFCB40EFA4CE88E9E7BB5BF48354B2042A9F911FB2D1D6799D41DB54
                          APIs
                          • FindFirstFileA.KERNELBASE(?,00421548,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,004058F7,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0), ref: 00406045
                          • FindClose.KERNEL32(00000000), ref: 00406051
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nspAAB1.tmp, xrefs: 0040603A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: C:\Users\user\AppData\Local\Temp\nspAAB1.tmp
                          • API String ID: 2295610775-2486177878
                          • Opcode ID: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                          • Instruction ID: ffb9975cce6792308ede9dbdbab0a2e32819aea082b360212a672f9e7c6ece7a
                          • Opcode Fuzzy Hash: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                          • Instruction Fuzzy Hash: 7BD012319490306BC3106B787C0C85B7A599F573317118A33B56AF12F0C7389C7286ED
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                          • LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: AddressHandleLibraryLoadModuleProc
                          • String ID:
                          • API String ID: 310444273-0
                          • Opcode ID: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                          • Instruction ID: 2c1b19e4de550b622e70843c6ca25527790cfa0381149662c4593fbace01eca7
                          • Opcode Fuzzy Hash: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                          • Instruction Fuzzy Hash: 00E0C232A04211ABC321AB749D48D3B73ACAFD8751309493EF50AF6150D734AC21EBBA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 169 403b19-403b2b 170 403b31-403b37 169->170 171 403c6c-403c7b 169->171 170->171 172 403b3d-403b46 170->172 173 403cca-403cdf 171->173 174 403c7d-403cc5 GetDlgItem * 2 call 403fec SetClassLongA call 40140b 171->174 175 403b48-403b55 SetWindowPos 172->175 176 403b5b-403b5e 172->176 178 403ce1-403ce4 173->178 179 403d1f-403d24 call 404038 173->179 174->173 175->176 181 403b60-403b72 ShowWindow 176->181 182 403b78-403b7e 176->182 184 403ce6-403cf1 call 401389 178->184 185 403d17-403d19 178->185 187 403d29-403d44 179->187 181->182 188 403b80-403b95 DestroyWindow 182->188 189 403b9a-403b9d 182->189 184->185 200 403cf3-403d12 SendMessageA 184->200 185->179 186 403fb9 185->186 194 403fbb-403fc2 186->194 192 403d46-403d48 call 40140b 187->192 193 403d4d-403d53 187->193 195 403f96-403f9c 188->195 197 403bb0-403bb6 189->197 198 403b9f-403bab SetWindowLongA 189->198 192->193 203 403f77-403f90 DestroyWindow EndDialog 193->203 204 403d59-403d64 193->204 195->186 201 403f9e-403fa4 195->201 205 403c59-403c67 call 404053 197->205 206 403bbc-403bcd GetDlgItem 197->206 198->194 200->194 201->186 208 403fa6-403faf ShowWindow 201->208 203->195 204->203 209 403d6a-403db7 call 405d58 call 403fec * 3 GetDlgItem 204->209 205->194 210 403bec-403bef 206->210 211 403bcf-403be6 SendMessageA IsWindowEnabled 206->211 208->186 239 403dc1-403dfd ShowWindow KiUserCallbackDispatcher call 40400e EnableWindow 209->239 240 403db9-403dbe 209->240 212 403bf1-403bf2 210->212 213 403bf4-403bf7 210->213 211->186 211->210 216 403c22-403c27 call 403fc5 212->216 217 403c05-403c0a 213->217 218 403bf9-403bff 213->218 216->205 220 403c40-403c53 SendMessageA 217->220 222 403c0c-403c12 217->222 218->220 221 403c01-403c03 218->221 220->205 221->216 225 403c14-403c1a call 40140b 222->225 226 403c29-403c32 call 40140b 222->226 237 403c20 225->237 226->205 235 403c34-403c3e 226->235 235->237 237->216 243 403e02 239->243 244 403dff-403e00 239->244 240->239 245 403e04-403e32 GetSystemMenu EnableMenuItem SendMessageA 243->245 244->245 246 403e34-403e45 SendMessageA 245->246 247 403e47 245->247 248 403e4d-403e86 call 404021 call 405d36 lstrlenA call 405d58 SetWindowTextA call 401389 246->248 247->248 248->187 257 403e8c-403e8e 248->257 257->187 258 403e94-403e98 257->258 259 403eb7-403ecb DestroyWindow 258->259 260 403e9a-403ea0 258->260 259->195 262 403ed1-403efe CreateDialogParamA 259->262 260->186 261 403ea6-403eac 260->261 261->187 263 403eb2 261->263 262->195 264 403f04-403f5b call 403fec GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 262->264 263->186 264->186 269 403f5d-403f70 ShowWindow call 404038 264->269 271 403f75 269->271 271->195
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                          • ShowWindow.USER32(?), ref: 00403B72
                          • DestroyWindow.USER32 ref: 00403B86
                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                          • GetDlgItem.USER32(?,?), ref: 00403BC3
                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                          • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                          • GetDlgItem.USER32(?,00000001), ref: 00403C8C
                          • GetDlgItem.USER32(?,00000002), ref: 00403C96
                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403CB0
                          • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D01
                          • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                          • ShowWindow.USER32(00000000,?), ref: 00403DC8
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DDA
                          • EnableWindow.USER32(?,?), ref: 00403DF5
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E0B
                          • EnableMenuItem.USER32(00000000), ref: 00403E12
                          • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E2A
                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                          • lstrlenA.KERNEL32(Tosporet Setup: Installing,?,Tosporet Setup: Installing,00422F00), ref: 00403E66
                          • SetWindowTextA.USER32(?,Tosporet Setup: Installing), ref: 00403E75
                          • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID: Tosporet Setup: Installing
                          • API String ID: 3282139019-1449912710
                          • Opcode ID: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                          • Instruction ID: 1f8690e76de68066656ca8d54ad2d010e53819933bf2384d883f7e4ba9537b83
                          • Opcode Fuzzy Hash: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                          • Instruction Fuzzy Hash: 17C1C071A04205BBDB21AF21ED48D2B7EBCFB44706F40443EF601B11E1C7799942AB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 272 403787-40379f call 406061 275 4037a1-4037b1 call 405c94 272->275 276 4037b3-4037e4 call 405c1d 272->276 284 403807-403830 call 403a4c call 4058b4 275->284 280 4037e6-4037f7 call 405c1d 276->280 281 4037fc-403802 lstrcatA 276->281 280->281 281->284 290 403836-40383b 284->290 291 4038b7-4038bf call 4058b4 284->291 290->291 292 40383d-403861 call 405c1d 290->292 296 4038c1-4038c8 call 405d58 291->296 297 4038cd-4038f2 LoadImageA 291->297 292->291 302 403863-403865 292->302 296->297 300 403973-40397b call 40140b 297->300 301 4038f4-403924 RegisterClassA 297->301 315 403985-403990 call 403a4c 300->315 316 40397d-403980 300->316 305 403a42 301->305 306 40392a-40396e SystemParametersInfoA CreateWindowExA 301->306 303 403876-403882 lstrlenA 302->303 304 403867-403874 call 4057f1 302->304 309 403884-403892 lstrcmpiA 303->309 310 4038aa-4038b2 call 4057c6 call 405d36 303->310 304->303 312 403a44-403a4b 305->312 306->300 309->310 314 403894-40389e GetFileAttributesA 309->314 310->291 318 4038a0-4038a2 314->318 319 4038a4-4038a5 call 40580d 314->319 325 403996-4039b3 ShowWindow LoadLibraryA 315->325 326 403a19-403a1a call 4050f1 315->326 316->312 318->310 318->319 319->310 328 4039b5-4039ba LoadLibraryA 325->328 329 4039bc-4039ce GetClassInfoA 325->329 330 403a1f-403a21 326->330 328->329 331 4039d0-4039e0 GetClassInfoA RegisterClassA 329->331 332 4039e6-403a09 DialogBoxParamA call 40140b 329->332 334 403a23-403a29 330->334 335 403a3b-403a3d call 40140b 330->335 331->332 336 403a0e-403a17 call 4036d7 332->336 334->316 337 403a2f-403a36 call 40140b 334->337 335->305 336->312 337->316
                          APIs
                            • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                            • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                            • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          • lstrcatA.KERNEL32(1033,Tosporet Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Tosporet Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75573410,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",00000000), ref: 00403802
                          • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,1033,Tosporet Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Tosporet Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403877
                          • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                          • GetFileAttributesA.KERNEL32(Call), ref: 00403895
                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike), ref: 004038DE
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          • RegisterClassA.USER32(00422EA0), ref: 0040391B
                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403933
                          • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                          • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                          • LoadLibraryA.KERNELBASE(RichEd20), ref: 004039AF
                          • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                          • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                          • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                          • RegisterClassA.USER32(00422EA0), ref: 004039E0
                          • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Tosporet Setup: Installing$_Nb
                          • API String ID: 914957316-3282149653
                          • Opcode ID: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                          • Instruction ID: 361ceaa5e45529a70bb989737ed67fdedcb7c759bf8cf29c3cde223c60b7be46
                          • Opcode Fuzzy Hash: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                          • Instruction Fuzzy Hash: E661E6B16442007EE720AF659D45F273E6CEB8475AF40407FF941B22E2D67C9D02DA6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 343 402c79-402cc7 GetTickCount GetModuleFileNameA call 4059c7 346 402cd3-402d01 call 405d36 call 40580d call 405d36 GetFileSize 343->346 347 402cc9-402cce 343->347 355 402df1-402dff call 402bda 346->355 356 402d07-402d1e 346->356 348 402f18-402f1c 347->348 362 402ed0-402ed5 355->362 363 402e05-402e08 355->363 358 402d20 356->358 359 402d22-402d2f call 4031b6 356->359 358->359 367 402d35-402d3b 359->367 368 402e8c-402e94 call 402bda 359->368 362->348 365 402e34-402e80 GlobalAlloc call 406141 call 4059f6 CreateFileA 363->365 366 402e0a-402e22 call 4031cc call 4031b6 363->366 392 402e82-402e87 365->392 393 402e96-402ec6 call 4031cc call 402f1f 365->393 366->362 395 402e28-402e2e 366->395 372 402dbb-402dbf 367->372 373 402d3d-402d55 call 405982 367->373 368->362 376 402dc1-402dc7 call 402bda 372->376 377 402dc8-402dce 372->377 373->377 388 402d57-402d5e 373->388 376->377 384 402dd0-402dde call 4060d3 377->384 385 402de1-402deb 377->385 384->385 385->355 385->356 388->377 394 402d60-402d67 388->394 392->348 403 402ecb-402ece 393->403 394->377 396 402d69-402d70 394->396 395->362 395->365 396->377 398 402d72-402d79 396->398 398->377 400 402d7b-402d9b 398->400 400->362 402 402da1-402da5 400->402 404 402da7-402dab 402->404 405 402dad-402db5 402->405 403->362 406 402ed7-402ee8 403->406 404->355 404->405 405->377 407 402db7-402db9 405->407 408 402ef0-402ef5 406->408 409 402eea 406->409 407->377 410 402ef6-402efc 408->410 409->408 410->410 411 402efe-402f16 call 405982 410->411 411->348
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402C8D
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,00000400), ref: 00402CA9
                            • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 004059CB
                            • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                          • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 00402CF2
                          • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402E39
                          Strings
                          • Error launching installer, xrefs: 00402CC9
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                          • soft, xrefs: 00402D69
                          • C:\Users\user\Desktop, xrefs: 00402CD4, 00402CD9, 00402CDF
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C86, 00402E51
                          • C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe, xrefs: 00402C93, 00402CA2, 00402CB6, 00402CD3
                          • Null, xrefs: 00402D72
                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                          • "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe", xrefs: 00402C79
                          • Inst, xrefs: 00402D60
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                          • API String ID: 2803837635-4244473902
                          • Opcode ID: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                          • Instruction ID: 2a27acbe37a486d3f9fadad6f2898e15cdcbef103c1943e89973ac3215dbffb0
                          • Opcode Fuzzy Hash: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                          • Instruction Fuzzy Hash: BC61C671A40205ABDF20AF64DE89B9A76B4EF00315F20413BF904B72D1D7BC9E418BAD
                          APIs
                            • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                          • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 10001B67
                          • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                          • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                          • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                          • GlobalFree.KERNEL32(?), ref: 10001CC4
                          • GlobalFree.KERNEL32(?), ref: 10001CC9
                          • GlobalFree.KERNEL32(?), ref: 10001CCE
                          • GlobalFree.KERNEL32(00000000), ref: 10001E76
                          • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                          • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                          • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                          • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 745 40173f-401762 call 4029fd call 405833 750 401764-40176a call 405d36 745->750 751 40176c-40177e call 405d36 call 4057c6 lstrcatA 745->751 757 401783-401789 call 405fa1 750->757 751->757 761 40178e-401792 757->761 762 401794-40179e call 40603a 761->762 763 4017c5-4017c8 761->763 771 4017b0-4017c2 762->771 772 4017a0-4017ae CompareFileTime 762->772 765 4017d0-4017ec call 4059c7 763->765 766 4017ca-4017cb call 4059a2 763->766 773 401864-40188d call 40501f call 402f1f 765->773 774 4017ee-4017f1 765->774 766->765 771->763 772->771 788 401895-4018a1 SetFileTime 773->788 789 40188f-401893 773->789 775 4017f3-401835 call 405d36 * 2 call 405d58 call 405d36 call 40554a 774->775 776 401846-401850 call 40501f 774->776 775->761 809 40183b-40183c 775->809 786 401859-40185f 776->786 790 40289b 786->790 792 4018a7-4018b2 CloseHandle 788->792 789->788 789->792 793 40289d-4028a1 790->793 795 402892-402895 792->795 796 4018b8-4018bb 792->796 795->790 798 4018d0-4018d3 call 405d58 796->798 799 4018bd-4018ce call 405d58 lstrcatA 796->799 804 4018d8-40222b call 40554a 798->804 799->804 804->793 809->786 811 40183e-40183f 809->811 811->776
                          APIs
                          • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 0040177E
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 004017A8
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\nsnA57E.tmp$C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll$Call
                          • API String ID: 1941528284-3921920767
                          • Opcode ID: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                          • Instruction ID: 7da2985f373e49f587e0f88560f455237d5d3a700d2e38046b33ad83bb6d7614
                          • Opcode Fuzzy Hash: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                          • Instruction Fuzzy Hash: 0341B871910515BACF10BFA5DC46DAF3679DF41369F20823BF511F10E1D63C8A419A6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 812 40501f-405034 813 4050ea-4050ee 812->813 814 40503a-40504c 812->814 815 405057-405063 lstrlenA 814->815 816 40504e-405052 call 405d58 814->816 818 405080-405084 815->818 819 405065-405075 lstrlenA 815->819 816->815 821 405093-405097 818->821 822 405086-40508d SetWindowTextA 818->822 819->813 820 405077-40507b lstrcatA 819->820 820->818 823 405099-4050db SendMessageA * 3 821->823 824 4050dd-4050df 821->824 822->821 823->824 824->813 825 4050e1-4050e4 824->825 825->813
                          APIs
                          • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll), ref: 0040508D
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll
                          • API String ID: 2531174081-3705411113
                          • Opcode ID: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                          • Instruction ID: 2b33129011dff48d1edd85efe61027b37dbb0349f6b457de8e93b882053e083c
                          • Opcode Fuzzy Hash: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                          • Instruction Fuzzy Hash: C2219071900508BBDB119FA5CD84ADFBFB9EF14354F14807AF544B6290C2794E45DFA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 826 401f68-401f74 827 401f7a-401f90 call 4029fd * 2 826->827 828 40202f-402031 826->828 837 401f92-401f9d GetModuleHandleA 827->837 838 401f9f-401fad LoadLibraryExA 827->838 830 40217c-402181 call 401423 828->830 835 402892-4028a1 830->835 837->838 841 401faf-401fbc GetProcAddress 837->841 838->841 842 402028-40202a 838->842 843 401ffb-402000 call 40501f 841->843 844 401fbe-401fc4 841->844 842->830 848 402005-402008 843->848 846 401fc6-401fd2 call 401423 844->846 847 401fdd-401ff4 call 100016bd 844->847 846->848 856 401fd4-401fdb 846->856 850 401ff6-401ff9 847->850 848->835 851 40200e-402016 call 403727 848->851 850->848 851->835 857 40201c-402023 FreeLibrary 851->857 856->848 857->835
                          APIs
                          • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F93
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                          • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                          • String ID: ("o
                          • API String ID: 2987980305-3013670051
                          • Opcode ID: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                          • Instruction ID: 23a464ffe6ca8440643a385a127484fd4ee8ad6b227fb7efa4d26ad3fc5b3ac3
                          • Opcode Fuzzy Hash: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                          • Instruction Fuzzy Hash: D7210872904211BACF107FA48E49A6E39B0AB44358F60823BF601B62D1D7BC4941AA6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 859 40231c-402362 call 402af2 call 4029fd * 2 RegCreateKeyExA 866 402892-4028a1 859->866 867 402368-402370 859->867 868 402380-402383 867->868 869 402372-40237f call 4029fd lstrlenA 867->869 873 402393-402396 868->873 874 402385-402392 call 4029e0 868->874 869->868 875 4023a7-4023bb RegSetValueExA 873->875 876 402398-4023a2 call 402f1f 873->876 874->873 880 4023c0-402496 RegCloseKey 875->880 881 4023bd 875->881 876->875 880->866 884 402663-40266a 880->884 881->880 884->866
                          APIs
                          • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnA57E.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                          • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsnA57E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnA57E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp
                          • API String ID: 1356686001-3215501296
                          • Opcode ID: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                          • Instruction ID: 937c1904c824b73ffe337d2eacc138a1f8ac1658d2030852d1a46e58dbdf142b
                          • Opcode Fuzzy Hash: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                          • Instruction Fuzzy Hash: D71172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 885 4015b3-4015c6 call 4029fd call 40585f 890 4015c8-4015e3 call 4057f1 CreateDirectoryA 885->890 891 40160a-40160d 885->891 899 401600-401608 890->899 900 4015e5-4015f0 GetLastError 890->900 892 401638-402181 call 401423 891->892 893 40160f-40162a call 401423 call 405d36 SetCurrentDirectoryA 891->893 906 402892-4028a1 892->906 893->906 908 401630-401633 893->908 899->890 899->891 903 4015f2-4015fb GetFileAttributesA 900->903 904 4015fd 900->904 903->899 903->904 904->899 908->906
                          APIs
                            • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040586D
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                          • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                          • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                          • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,000000F0), ref: 00401622
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401617
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 3751793516-862733243
                          • Opcode ID: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                          • Instruction ID: decf54c0780f34986dcb1f6dc2400c6331eb5c21fa926316ee50895bb5337331
                          • Opcode Fuzzy Hash: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                          • Instruction Fuzzy Hash: CE11E931908150ABDB217F755D4496F67B4EA62365728473FF891B22D2C23C4D42E62E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 911 4059f6-405a00 912 405a01-405a2c GetTickCount GetTempFileNameA 911->912 913 405a3b-405a3d 912->913 914 405a2e-405a30 912->914 916 405a35-405a38 913->916 914->912 915 405a32 914->915 915->916
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405A0A
                          • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405A24
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-816644046
                          • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                          • Instruction ID: 2f7b9810ed7c5924072585cf2130ed1295747d9915b618abfa336aedeca5813d
                          • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                          • Instruction Fuzzy Hash: C1F0E2327482487BDB008F1ADC44B9B7B9CDF91710F00C03BF904AA280D2B0A8008B68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 917 100016bd-100016f9 call 10001a5d 921 1000180a-1000180c 917->921 922 100016ff-10001703 917->922 923 10001705-1000170b call 100021b0 922->923 924 1000170c-10001719 call 100021fa 922->924 923->924 929 10001749-10001750 924->929 930 1000171b-10001720 924->930 931 10001770-10001774 929->931 932 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 929->932 933 10001722-10001723 930->933 934 1000173b-1000173e 930->934 939 100017b2-100017b8 call 100023da 931->939 940 10001776-100017b0 call 10001559 call 100023da 931->940 956 100017b9-100017bd 932->956 937 10001725-10001726 933->937 938 1000172b-1000172c call 100027ec 933->938 934->929 935 10001740-10001741 call 10002aa7 934->935 948 10001746 935->948 944 10001733-10001739 call 1000258d 937->944 945 10001728-10001729 937->945 951 10001731 938->951 939->956 940->956 955 10001748 944->955 945->929 945->938 948->955 951->948 955->929 960 100017fa-10001801 956->960 961 100017bf-100017cd call 100023a0 956->961 960->921 963 10001803-10001804 GlobalFree 960->963 967 100017e5-100017ec 961->967 968 100017cf-100017d2 961->968 963->921 967->960 970 100017ee-100017f9 call 100014e2 967->970 968->967 969 100017d4-100017dc 968->969 969->967 971 100017de-100017df FreeLibrary 969->971 970->960 971->967
                          APIs
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                          • GlobalFree.KERNEL32(00000000), ref: 10001768
                          • FreeLibrary.KERNEL32(?), ref: 100017DF
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                            • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                            • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                            • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,10004010,00000000,10001695,00000000), ref: 10001572
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                          • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                          • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                          • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 974 40303a-403063 GetTickCount 975 4031a4-4031ac call 402bda 974->975 976 403069-403094 call 4031cc SetFilePointer 974->976 981 4031ae-4031b3 975->981 982 403099-4030ab 976->982 983 4030ad 982->983 984 4030af-4030bd call 4031b6 982->984 983->984 987 4030c3-4030cf 984->987 988 403196-403199 984->988 989 4030d5-4030db 987->989 988->981 990 403106-403122 call 406161 989->990 991 4030dd-4030e3 989->991 997 403124-40312c 990->997 998 40319f 990->998 991->990 992 4030e5-403105 call 402bda 991->992 992->990 1000 403160-403166 997->1000 1001 40312e-403144 WriteFile 997->1001 999 4031a1-4031a2 998->999 999->981 1000->998 1004 403168-40316a 1000->1004 1002 403146-40314a 1001->1002 1003 40319b-40319d 1001->1003 1002->1003 1005 40314c-403158 1002->1005 1003->999 1004->998 1006 40316c-40317f 1004->1006 1005->989 1007 40315e 1005->1007 1006->982 1008 403185-403194 SetFilePointer 1006->1008 1007->1006 1008->975
                          APIs
                          • GetTickCount.KERNEL32 ref: 0040304F
                            • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                          • WriteFile.KERNELBASE(0040A8A0,0040FBC1,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?), ref: 0040313C
                          • SetFilePointer.KERNELBASE(0013656A,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$Pointer$CountTickWrite
                          • String ID:
                          • API String ID: 2146148272-0
                          • Opcode ID: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                          • Instruction ID: 01a25493adf58fb9a894681412e440a2e883d4234beea4965eba9eb13e735820
                          • Opcode Fuzzy Hash: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                          • Instruction Fuzzy Hash: CC414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389D52CB5E
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                          • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll, xrefs: 004024DD, 00402502
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FileWritelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll
                          • API String ID: 427699356-82958726
                          • Opcode ID: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                          • Instruction ID: 4826b5ec7f58a8945af1d05ae4e09a11cd1e532a13e769836b40841c5f4177c7
                          • Opcode Fuzzy Hash: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                          • Instruction Fuzzy Hash: 80F054B2A54244BFDB40ABA19E499EB66A4DB40309F10443FB141F61C2D5BC4941A66A
                          APIs
                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                          • CloseHandle.KERNEL32(?), ref: 0040551B
                          Strings
                          • Error launching installer, xrefs: 004054F8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                          • Instruction ID: 0ae392a05d3974bec86de51aa2f8a5c28ff0ee3cdd976454f3eed0d5dd72dd2a
                          • Opcode Fuzzy Hash: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                          • Instruction Fuzzy Hash: 2BE0BFB4A00209BFEB109FA4ED05F7B76ADEB14745F508561BD11F2160E774A9108A79
                          APIs
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 00405FF9
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040600B
                            • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040601B
                          • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 00403204
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Char$Next$CreateDirectoryPrev
                          • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 4115351271-3144792594
                          • Opcode ID: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                          • Instruction ID: 89773af62672bbf6302d30782f314b1c1bc42d6855f09756152acd8bf908297a
                          • Opcode Fuzzy Hash: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                          • Instruction Fuzzy Hash: 24D0C71290AD3066D5513B6A7C46FCF050C8F4675DF11807BF904751C58F6C555395EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                          • Instruction ID: d3f30c549e8eaa155af2d8805db43d359078549a114e1d1e4cfdde4495a9482f
                          • Opcode Fuzzy Hash: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                          • Instruction Fuzzy Hash: 13A14471E00228CBDF28DFA8C8447ADBBB1FB45305F15816ED816BB281D7785A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                          • Instruction ID: 66af66db22d428e7cee4185570621c0262e28a8f97ef0091af547b150b1cef7f
                          • Opcode Fuzzy Hash: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                          • Instruction Fuzzy Hash: 7F912170E00228CBDF28DF98C8947ADBBB1FB45305F15816ED816BB281C7786A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                          • Instruction ID: 36158da5dd70985ab85e2c4d41886ca33cae813362c0b87a96f868d92fb05337
                          • Opcode Fuzzy Hash: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                          • Instruction Fuzzy Hash: 65815771D00228CFDF24CFA8C8847ADBBB1FB45305F25816AD816BB281D778A996DF15
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                          • Instruction ID: 1715bfb1c3d5716620224504c503b3d15fe2aa0a2bbcc08a305e6ffc6cb4203b
                          • Opcode Fuzzy Hash: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                          • Instruction Fuzzy Hash: 53817771D00228DBDF24CFA8C8447ADBBB0FB44301F2581AED856BB281D7786A96DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                          • Instruction ID: 032b7c8430df6362c90b97cb5f8c3133674bcd2d0f853081a3cdcc23126a0f5c
                          • Opcode Fuzzy Hash: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                          • Instruction Fuzzy Hash: 87711371D00228CFDF24CF98C8847ADBBB1FB48305F15806AD816BB281D7785996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                          • Instruction ID: 3e9dbefe820a1d4baf734be7fb741bb2fb66d8e6f9ed59188b506b6c9edb630d
                          • Opcode Fuzzy Hash: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                          • Instruction Fuzzy Hash: AB711371E00228CBDF28CF98C884BADBBB1FB44305F15816ED816BB281D7786996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                          • Instruction ID: 1812ff5f5430a706778d8acc512246fd3c212bc7acfdfbe5d0fa3af8c8d1a12f
                          • Opcode Fuzzy Hash: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                          • Instruction Fuzzy Hash: AD712471E00228CBDF28DF98C844BADBBB1FB44305F15806ED856BB291C7786A96DF45
                          APIs
                          • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                          • WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,00000004,00000004,00000000,00000000,?,?), ref: 00402FD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$PointerWrite
                          • String ID:
                          • API String ID: 539440098-0
                          • Opcode ID: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                          • Instruction ID: 3b6e370e410e3f669d4a968ba26e16673121f6254c39c59cd6eb20204b18cf3c
                          • Opcode Fuzzy Hash: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                          • Instruction Fuzzy Hash: 14313931502259FFDF20DF55DD44A9E3BA8EF04395F20403AF908A61D0D2789A41EBA9
                          APIs
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                            • Part of subcall function 004054E5: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                            • Part of subcall function 004054E5: CloseHandle.KERNEL32(?), ref: 0040551B
                          • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                          • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401EA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                          • String ID:
                          • API String ID: 3521207402-0
                          • Opcode ID: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                          • Instruction ID: a57a420adebbec2e463a2757bf84d9d81012cc1a8c5c1569ff173e75ada2264d
                          • Opcode Fuzzy Hash: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                          • Instruction Fuzzy Hash: 66014031904114FBDF21AFA1DD859EE7B71EB40345F10857BFA01B51E1C3794A81EBAA
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000002,00405E62,00000000,00000002,?,00000002,?,?,00405E62,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C46
                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00405E62,?,00405E62), ref: 00405C67
                          • RegCloseKey.KERNELBASE(?), ref: 00405C88
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                          • Instruction ID: f8269c4da42e469e915d7b724f411cb256963c2af92f405d5d85614ed9ec7fb6
                          • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                          • Instruction Fuzzy Hash: 8801487114420EEFEB128F64EC44EEB3FACEF15394F00402AF945A6220D235D964DBA5
                          APIs
                            • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B2F
                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402468
                          • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 0040247B
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnA57E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Enum$CloseOpenValue
                          • String ID:
                          • API String ID: 167947723-0
                          • Opcode ID: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                          • Instruction ID: 09a8887cd5e4729410dcfabe5c46d2a670465c21522258ca6cdcbf1033b2090e
                          • Opcode Fuzzy Hash: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                          • Instruction Fuzzy Hash: E8F08671904204FFD7119F659D8CEBF7A6CEB40748F10453EF441B62C0D6B95E41966A
                          APIs
                            • Part of subcall function 004059A2: GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                            • Part of subcall function 004059A2: SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                          • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040579D), ref: 004055C9
                          • DeleteFileA.KERNELBASE(?,?,?,00000000,0040579D), ref: 004055D1
                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 004055E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$Attributes$DeleteDirectoryRemove
                          • String ID:
                          • API String ID: 1655745494-0
                          • Opcode ID: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                          • Instruction ID: 12c6f0b15b18e033ed95b071f1fc2c07b3079c0683f10f414bd997d86f240b92
                          • Opcode Fuzzy Hash: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                          • Instruction Fuzzy Hash: 98E0E532518A5067C21057309D08A5F3ADADFCA324F044936F492F21D4DB7848068ABA
                          APIs
                          • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,?), ref: 00401E1E
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401E09
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 587946157-862733243
                          • Opcode ID: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                          • Instruction ID: 92cbb6ba42742382510c3a8e41a68a30635fa0dc9ae6a59fa4a75f74f7b170a3
                          • Opcode Fuzzy Hash: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                          • Instruction Fuzzy Hash: 8DF0F6B3B041047ACB41ABB59E4AE5D2BA4EB41718F240A3BF400F71C2DAFC8841F728
                          APIs
                          • CreateFileA.KERNELBASE(00000000), ref: 100028AB
                          • GetLastError.KERNEL32 ref: 100029B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CreateErrorFileLast
                          • String ID:
                          • API String ID: 1214770103-0
                          • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                          • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                          • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                          • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                          • Instruction ID: da56ad7cfcb2a9fecb994a09e4a0bd113f750103611445cd7b28aada07ee45e3
                          • Opcode Fuzzy Hash: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                          • Instruction Fuzzy Hash: 2E012831B24210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                          APIs
                          • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A04
                          • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A17
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: EnvironmentExpandStringslstrcmp
                          • String ID:
                          • API String ID: 1938659011-0
                          • Opcode ID: 9bea9ff0f32edb465556edde0149644beb3132e1d0783da20080aef97cccd5be
                          • Instruction ID: e1e98ceffc8efcc411d1cb62caadeb15d6b2150a68b253517cb8490ae8184d68
                          • Opcode Fuzzy Hash: 9bea9ff0f32edb465556edde0149644beb3132e1d0783da20080aef97cccd5be
                          • Instruction Fuzzy Hash: 2FF0A772F05201EBCB21CF699D44A9B7FE4EF51350B10803BE545F6190D2788541EB59
                          APIs
                          • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DC2
                          • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                          • Instruction ID: 18ac702c75a7039fec00373c4f699ed09bc4c8ec852dd7b5b9a0ef8cb6e9c66a
                          • Opcode Fuzzy Hash: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                          • Instruction Fuzzy Hash: 39E0CD72B04110EBCB10BBB45D4A55E3374DF10359B10443BF501F11C1D2B85C40565D
                          APIs
                          • GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 004059CB
                          • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                          • Instruction ID: 21e5f81f3e52fa2c8f9e5bc24a994218dd140026ef3a1e453d479de883aad6ce
                          • Opcode Fuzzy Hash: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                          • Instruction Fuzzy Hash: 94D09E31668301AFEF098F20DD16F2E7BA2EB84B00F10562CB682D40E0D6755815DB16
                          APIs
                          • GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                          • SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                          • Instruction ID: a98ca5448702c3e829ea1667e49b0be7f6aa4c87fef4348ac0342a167d80fd98
                          • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                          • Instruction Fuzzy Hash: 19D0C9B2918120EBC2102728AD0889BBF69EB542717018B31F865A22B0C7304C52DAA9
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: wsprintf
                          • String ID:
                          • API String ID: 2111968516-0
                          • Opcode ID: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                          • Instruction ID: 80d1f72451bcef36c881c8715d37a41c16cfaf5c23ac720a97db8ffa6bd4d959
                          • Opcode Fuzzy Hash: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                          • Instruction Fuzzy Hash: C121D870D05295BEDF229F644A581EEBBB09B05304F64407FE491BA3C5E1BC9A82CB2D
                          APIs
                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                          • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                          • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                          • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                          • Instruction ID: 0a8c9e11f48196ea829b02b8213bca88da5b23a5d36cc3de3ae654890f4390ea
                          • Opcode Fuzzy Hash: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                          • Instruction Fuzzy Hash: E4E04FB6A04220BBDB01BBA59E4ADBF6768EB50309B14853BF501F40C1D3BD4802962E
                          APIs
                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B2F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                          • Instruction ID: 087740a894708ae54e311fe38564fcb001a0ed9e3d0f4d4a62d19f1d4de25a1d
                          • Opcode Fuzzy Hash: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                          • Instruction Fuzzy Hash: 38E046B6250108AADB40EFA4EE4AF9537ECFB04700F008021BA08E7091CA78E5509B69
                          APIs
                          • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128A0,0040A8A0,004031C9,00409130,00409130,004030BB,004128A0,00004000,?,00000000,?), ref: 00405A53
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                          • Instruction ID: 55609983f428609d3339a900fe5ea2c3161a13bcf9e808ef2cae39733250456b
                          • Opcode Fuzzy Hash: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                          • Instruction Fuzzy Hash: F7E08C3231025AABDF109EA09C40AEB3B6CEB00760F084432FA14E2040D230E9218FA5
                          APIs
                          • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 1000272D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                          • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                          • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                          • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                          APIs
                          • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                          • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                          • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                          • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                          APIs
                          • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                          • Instruction ID: bed2877986d8c12a83e01492d596720214e57a472dec7050afa6ab6fccae40cd
                          • Opcode Fuzzy Hash: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                          • Instruction Fuzzy Hash: 17D01277B08114E7DB00DBB5AE48A9E73A4FB50325F208637D111F11D0D3B98551A629
                          APIs
                          • SendMessageA.USER32(0001044C,00000000,00000000,00000000), ref: 0040404A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                          • Instruction ID: af7fd4c3fc1dda8ad1a195a9021ea177fcc43fc0d0bb539f8953ea950d20d41d
                          • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                          • Instruction Fuzzy Hash: DFC09B717443007BEA31DB509D49F077758A750B00F5584357320F50D0C6B4F451D62D
                          APIs
                          • SendMessageA.USER32(00000028,?,00000001,00403E52), ref: 0040402F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                          • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                          • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                          • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                          • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                          • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                          • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,00403DEB), ref: 00404018
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                          • Instruction ID: f87940b9544c4de7e657a104dd6f20edac94ef916c9b89b279468f5034d51d6a
                          • Opcode Fuzzy Hash: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                          • Instruction Fuzzy Hash: E2A01231404001DBCB014B10DF04C45FF21B7503007018030E50140034C6310420FF09
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                          • Instruction ID: 4daead48d26ae6742cc4751adb680189456718570d67c7320b978f12710e1ab5
                          • Opcode Fuzzy Hash: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                          • Instruction Fuzzy Hash: DFD0C7B7B141006BD750E7B86E8545A73E8F75135A7148837D502E1191D17DC9415519
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                          • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                          • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                          • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 004049B4
                          • GetDlgItem.USER32(?,00000408), ref: 004049BF
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A09
                          • LoadBitmapA.USER32(0000006E), ref: 00404A1C
                          • SetWindowLongA.USER32(?,000000FC,00404F93), ref: 00404A35
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A49
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A5B
                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404A71
                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A7D
                          • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404A8F
                          • DeleteObject.GDI32(00000000), ref: 00404A92
                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404ABD
                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404AC9
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5E
                          • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B89
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B9D
                          • GetWindowLongA.USER32(?,000000F0), ref: 00404BCC
                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404BDA
                          • ShowWindow.USER32(?,00000005), ref: 00404BEB
                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CE8
                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D4D
                          • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404D62
                          • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404D86
                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DA6
                          • ImageList_Destroy.COMCTL32(00000000), ref: 00404DBB
                          • GlobalFree.KERNEL32(00000000), ref: 00404DCB
                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E44
                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404EED
                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EFC
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F1C
                          • ShowWindow.USER32(?,00000000), ref: 00404F6A
                          • GetDlgItem.USER32(?,000003FE), ref: 00404F75
                          • ShowWindow.USER32(00000000), ref: 00404F7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                          • Instruction ID: ec1b41ef9246f4b5ca9c31e675ea93c5522bc938a585a88f05d0904c7564d9ec
                          • Opcode Fuzzy Hash: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                          • Instruction Fuzzy Hash: 7A025FB0900209AFEB10DF94DC85AAE7BB5FB84315F10817AFA10B62E1D7789D42DF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404479
                          • SetWindowTextA.USER32(00000000,?), ref: 004044A3
                          • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                          • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                          • lstrcmpiA.KERNEL32(Call,Tosporet Setup: Installing), ref: 00404591
                          • lstrcatA.KERNEL32(?,Call), ref: 0040459D
                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045AF
                            • Part of subcall function 0040552E: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 00405541
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 00405FF9
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040600B
                            • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040601B
                          • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,?,00000000,0041ECC8,?,?,000003FB,?), ref: 0040466C
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404687
                            • Part of subcall function 004047E0: lstrlenA.KERNEL32(Tosporet Setup: Installing,Tosporet Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                            • Part of subcall function 004047E0: wsprintfA.USER32 ref: 00404886
                            • Part of subcall function 004047E0: SetDlgItemTextA.USER32(?,Tosporet Setup: Installing), ref: 00404899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$Call$Tosporet Setup: Installing
                          • API String ID: 2624150263-4253715792
                          • Opcode ID: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                          • Instruction ID: 5a451af96f6c61f8b8aedc9e732e962e3b59a2a539d705b9404eba0a1a8e20eb
                          • Opcode Fuzzy Hash: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                          • Instruction Fuzzy Hash: A6A162B1900208ABDB11AFA6CD45AEFB7B9EF85314F10843BF611B72D1D77C89418B69
                          APIs
                          • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                          • Instruction ID: 2b7524724565807a685c72c68d6b6eabb337ae57375c882a310f3ed35d4a28aa
                          • Opcode Fuzzy Hash: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                          • Instruction Fuzzy Hash: D4F0EC72504110EBD700EBB4994DAEE77B8DF51314F60457BE141F21C1D3B84945E72E
                          APIs
                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041C0
                          • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004041F2
                          • GetSysColor.USER32(?), ref: 00404203
                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                          • lstrlenA.KERNEL32(?), ref: 00404224
                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                          • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                          • SendMessageA.USER32(00000000), ref: 004042AD
                          • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                          • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                          • SetCursor.USER32(00000000), ref: 00404330
                          • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,00000001), ref: 00404343
                          • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                          • SetCursor.USER32(00000000), ref: 00404353
                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040437F
                          • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404393
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                          • String ID: Call$N$open
                          • API String ID: 3615053054-2563687911
                          • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                          • Instruction ID: 47d1c741c4840d0b501b4796cf3fe0e3440e9ec9cd7b0debe1a5eac4f9bfffd7
                          • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                          • Instruction Fuzzy Hash: 8F61A0B1A40309BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                          APIs
                          • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405C12,?,?,00000001,004057B5,?,00000000,000000F1,?), ref: 00405A7E
                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405C12,?,?,00000001,004057B5,?,00000000,000000F1,?), ref: 00405AA2
                          • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405AAB
                            • Part of subcall function 0040592C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                            • Part of subcall function 0040592C: lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                          • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405AC8
                          • wsprintfA.USER32 ref: 00405AE6
                          • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,00000004,00421E88,?,?,?,?,?), ref: 00405B21
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405B30
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B68
                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BBE
                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405BD0
                          • GlobalFree.KERNEL32(00000000), ref: 00405BD7
                          • CloseHandle.KERNEL32(00000000), ref: 00405BDE
                            • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 004059CB
                            • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                          • String ID: %s=%s$NUL$[Rename]
                          • API String ID: 1265525490-4148678300
                          • Opcode ID: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                          • Instruction ID: 2d1e09aab0418ff75005a817fdb93eb8b9645243d234663ae25a64343302d3c0
                          • Opcode Fuzzy Hash: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                          • Instruction Fuzzy Hash: BE41DEB1604A15BFD6206B219C49F6B3A6CDF45718F14053BBE01FA2D2EA7CB8018E7D
                          APIs
                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                          • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                          • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                          • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                          APIs
                          • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 00405FF9
                          • CharNextA.USER32(?,?,?,00000000), ref: 00406006
                          • CharNextA.USER32(?,"C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040600B
                          • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 0040601B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-3818978384
                          • Opcode ID: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                          • Instruction ID: 96a923a8ee4f60b6f191beee89bac6a1f57d38d5d4ddb578b75945660f6dc773
                          • Opcode Fuzzy Hash: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                          • Instruction Fuzzy Hash: 57110451908B9229FB325A284C40B777F99CF5A760F18047FE5C1722C2C67C5C529B6E
                          APIs
                          • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                          • GetSysColor.USER32(00000000), ref: 0040408C
                          • SetTextColor.GDI32(?,00000000), ref: 00404098
                          • SetBkMode.GDI32(?,?), ref: 004040A4
                          • GetSysColor.USER32(?), ref: 004040B7
                          • SetBkColor.GDI32(?,?), ref: 004040C7
                          • DeleteObject.GDI32(?), ref: 004040E1
                          • CreateBrushIndirect.GDI32(?), ref: 004040EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                          • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                          • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                          • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 1000234A
                            • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C3
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E7
                          • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                          • GlobalFree.KERNEL32(00000000), ref: 100022FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                          • String ID:
                          • API String ID: 3730416702-0
                          • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                          • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                          • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                          • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                          APIs
                            • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                          • GlobalFree.KERNEL32(?), ref: 100024B9
                          • GlobalFree.KERNEL32(00000000), ref: 100024F3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                          • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                          • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                          • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D7
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026F3
                          • GlobalFree.KERNEL32(?), ref: 0040272C
                          • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 0040273E
                          • GlobalFree.KERNEL32(00000000), ref: 00402745
                          • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 0040275D
                          • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 00402771
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                          • String ID:
                          • API String ID: 3294113728-0
                          • Opcode ID: 0f129fd7f7df80537c5f9e1eb6f54556ad660c5267986f7df7bd7c5007d73d3e
                          • Instruction ID: 552098977e22cffcc29eaacdabede243c0f20e1b5d71923adfcfca28e3e686eb
                          • Opcode Fuzzy Hash: 0f129fd7f7df80537c5f9e1eb6f54556ad660c5267986f7df7bd7c5007d73d3e
                          • Instruction Fuzzy Hash: 63318DB1C00118BFCF216FA5CD89DAE7E79EF09364F10423AF520762E1C6795D419BA9
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402BF2
                          • GetTickCount.KERNEL32 ref: 00402C10
                          • wsprintfA.USER32 ref: 00402C3E
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsnA57E.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                          • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                            • Part of subcall function 00402BBE: MulDiv.KERNEL32(00036845,00000064,00038D48), ref: 00402BD3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                          • Instruction ID: 53b2eec8c243fd5a5b591a6d8e7090b5e500d3da6e0592f5c5af2241ed808ea0
                          • Opcode Fuzzy Hash: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                          • Instruction Fuzzy Hash: AB0188B0949614ABDB216F64AE4DE9F7B7CFB017057148037FA01B11E1C6B8D541CBAE
                          APIs
                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404905
                          • GetMessagePos.USER32 ref: 0040490D
                          • ScreenToClient.USER32(?,?), ref: 00404927
                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404939
                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040495F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                          • Instruction ID: 7baaa9b85802c8a5173365c44ed2834cc31749f5d024e9fb4d2ec5e64c2f69ce
                          • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                          • Instruction Fuzzy Hash: E40140B1D00218BADB01DBA4DC85FFFBBBCAB95721F10412BBA10B61D0C7B469018BA5
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B5D
                          • wsprintfA.USER32 ref: 00402B91
                          • SetWindowTextA.USER32(?,?), ref: 00402BA1
                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                          • Instruction ID: 4b4d840d1cf11f9656568dd8641bec75cd76f4f3bd4f461a87d93eb2d0bf3f96
                          • Opcode Fuzzy Hash: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                          • Instruction Fuzzy Hash: F7F01D70900208BBEF215F61DD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                          APIs
                          • lstrlenA.KERNEL32(Tosporet Setup: Installing,Tosporet Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                          • wsprintfA.USER32 ref: 00404886
                          • SetDlgItemTextA.USER32(?,Tosporet Setup: Installing), ref: 00404899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$Tosporet Setup: Installing
                          • API String ID: 3540041739-4004758435
                          • Opcode ID: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                          • Instruction ID: 8631c14a921e8479d2aaee063571767324bc63c1cfe9171b6f21c1c007081b9c
                          • Opcode Fuzzy Hash: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                          • Instruction Fuzzy Hash: 90112433A441283BDB0065AD9C49EAF328CDF81334F244637FA25F61D1E9788C1292E8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                          • Instruction ID: 97b6efd1b10b48d7ee9b7c7fbc92de58723c24235f199e6d6d25645bb0e8c5d4
                          • Opcode Fuzzy Hash: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                          • Instruction Fuzzy Hash: DC512532D04159AEFB55DFB488A4AEEBBF6EF453C0F12416AE841B315DCA306E4087D2
                          APIs
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                          • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                          • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                          • Instruction ID: 1cfc72d501241f28ff1c9237e437913a5e8660848d06dce24e2e83bd327c9a1b
                          • Opcode Fuzzy Hash: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                          • Instruction Fuzzy Hash: EA114F71A00108FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0DBB49E559F69
                          APIs
                          • GetDlgItem.USER32(?), ref: 00401CD0
                          • GetClientRect.USER32(00000000,?), ref: 00401CDD
                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                          • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                          • DeleteObject.GDI32(00000000), ref: 00401D1B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                          • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                          • Opcode Fuzzy Hash: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                          • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                          APIs
                          • GetDC.USER32(?), ref: 00401D29
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                          • ReleaseDC.USER32(?,00000000), ref: 00401D56
                          • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                          • Instruction ID: b452d76144ce78c1ea2c31cbd89393ff29a213aa8dcca448cc35c7c7cb6754f7
                          • Opcode Fuzzy Hash: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                          • Instruction Fuzzy Hash: F8011271948340AFE701DBB0AE0EB9A7F74EB19705F108535F141B72E2C6B954159B2F
                          APIs
                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                          • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                          • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                          • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728
                          APIs
                          • SetWindowTextA.USER32(00000000,00422F00), ref: 00403AE4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: TextWindow
                          • String ID: "C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe"$1033$Tosporet Setup: Installing
                          • API String ID: 530164218-2083703288
                          • Opcode ID: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                          • Instruction ID: 694a286dd4981efc18ef326c294584d4bec2a1602357d8abc11fec8a6f834ca0
                          • Opcode Fuzzy Hash: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                          • Instruction Fuzzy Hash: EC11D4B1B046109BCB24DF15DC809337BBDEB8471A329813BE941A73A1C73D9E029A98
                          APIs
                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 004057CC
                          • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,004033C9), ref: 004057D5
                          • lstrcatA.KERNEL32(?,00409014), ref: 004057E6
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004057C6
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-4083868402
                          • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                          • Instruction ID: c144259923a6e848a034fe90771ae4f3275bad2fdba58d127270a3e6eafdfb33
                          • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                          • Instruction Fuzzy Hash: 00D0A962606A306BD20222168C09E8F6A08CF06300B044033F204B62B2C63C0D418FFE
                          APIs
                          • GlobalFree.KERNEL32(006F2228), ref: 00401B80
                          • GlobalAlloc.KERNEL32(00000040,00000404), ref: 00401B92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID: ("o$Call
                          • API String ID: 3394109436-2542331240
                          • Opcode ID: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                          • Instruction ID: f4ea3dfc62e5d1cff0d3b4274299d05e9f4495bdac059fa06bbe17ad9de4a94b
                          • Opcode Fuzzy Hash: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                          • Instruction Fuzzy Hash: 1721C072A00211ABC720EBA4CE8895E73B9EB54714724C53BF505B32D0D77CE8119F2E
                          APIs
                          • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                          • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                          • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                          • String ID:
                          • API String ID: 1404258612-0
                          • Opcode ID: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                          • Instruction ID: 9791f4c70c1528f8983e13c97e2cb0ced061aec02aec85b9ff59acd402aedfa8
                          • Opcode Fuzzy Hash: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                          • Instruction Fuzzy Hash: A0117071901209BEDF01EFA5DD85DAEBBB9EF04344B20807AF505F61A1D7388E55DB28
                          APIs
                          • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040586D
                          • CharNextA.USER32(00000000), ref: 00405872
                          • CharNextA.USER32(00000000), ref: 00405886
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nspAAB1.tmp, xrefs: 00405860
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: C:\Users\user\AppData\Local\Temp\nspAAB1.tmp
                          • API String ID: 3213498283-2486177878
                          • Opcode ID: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                          • Instruction ID: 725a23b4e930c3b6c27a7d0cd0e333612dd42f6c53d199a680129a9385ae8045
                          • Opcode Fuzzy Hash: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                          • Instruction Fuzzy Hash: 74F06253914F516AFB3276645C44B7B5A8CCF56361F188477EE40A62C2C2BC4C618F9A
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00404FC2
                          • CallWindowProcA.USER32(?,?,?,?), ref: 00405013
                            • Part of subcall function 00404038: SendMessageA.USER32(0001044C,00000000,00000000,00000000), ref: 0040404A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                          • Instruction ID: 01da3f5901ddaf9404fa7d81b8fd4ad62d8e53e58d7af57a61279808ed2d7cb1
                          • Opcode Fuzzy Hash: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                          • Instruction Fuzzy Hash: EA018F7110020DABDF209F11DC85E9F3B6AF784758F208037FA04752D1D77A8C92AAAE
                          APIs
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                            • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 0040586D
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0,00000000), ref: 00405907
                          • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,C:\Users\user\AppData\Local\Temp\nspAAB1.tmp,?,?,75572EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75572EE0), ref: 00405917
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nspAAB1.tmp
                          • API String ID: 3248276644-2486177878
                          • Opcode ID: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                          • Instruction ID: cee4b60d78671bb78a10d3fddc0396ac835ea714c96625339261d657e7680c9f
                          • Opcode Fuzzy Hash: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                          • Instruction Fuzzy Hash: 0AF02823105D6026C63233391C09AAF1B95CE86368B24853FFC51B22D1DB3C8863DE7E
                          APIs
                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75572EE0,004036C9,75573410,004034D6,?), ref: 0040370C
                          • GlobalFree.KERNEL32(006BFC28), ref: 00403713
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403704
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-4083868402
                          • Opcode ID: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                          • Instruction ID: 0fe4964e98027e88380181352afc78dea88c0f551701ba437740c6db36bc47f5
                          • Opcode Fuzzy Hash: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                          • Instruction Fuzzy Hash: 0EE0EC7390512097C6215F96AD04B5ABB686B89B62F06842AED407B3A18B746C418BD9
                          APIs
                          • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 00405813
                          • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,C:\Users\user\Desktop\Ricowell Ind New INQ.bat.exe,80000000,00000003), ref: 00405821
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-1876063424
                          • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                          • Instruction ID: ba052d51ab232c33a65bcd29671eceb75c11827358d6bb1c4ef4a0a5cf44e1aa
                          • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                          • Instruction Fuzzy Hash: 94D0A77341AD701EE30372109C04B8F6A48CF16300F098462E440B61A0C2780C414BED
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                          • GlobalFree.KERNEL32(00000000), ref: 100011B4
                          • GlobalFree.KERNEL32(?), ref: 100011C7
                          • GlobalFree.KERNEL32(?), ref: 100011F5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3910620506.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.3910603560.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910638325.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.3910652324.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                          • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                          • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                          • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                          • lstrcmpiA.KERNEL32(00405B5B,00000000), ref: 00405954
                          • CharNextA.USER32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 00405965
                          • lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3903621831.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3903609069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903638596.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903653302.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3903735353.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Ricowell Ind New INQ.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                          • Instruction ID: 6acf3bc3cda9f3bfd2525b0ac34aa546eab038af588102683640af0afc927a81
                          • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                          • Instruction Fuzzy Hash: 27F0C232604518FFC7129BA4DD40D9FBBA8EF06360B2500AAE800F7250D274EE019FAA